Black box tool to bypass SSL verification on Android, even when pinning is used..
android-ssl-bypass is hosted in the following web site
https://github.com/iSECPartners/android-ssl-bypass
If you think the Android project android-ssl-bypass listed in this page is inappropriate, such as containing malicious code/tools or violating the copyright, please email info at java2s dot com, thanks.
The following table is the detailed list of android-ssl-bypass.
Item | Value |
---|---|
Java File Count | 44 |
Supported screen sizes | [mdpi, hdpi, xhdpi] |
Minimum SDK Version | 10 |
Activity Count | 2 |
jar files used | android-support-v4.jar args4j-2.0.21.jar asb.jar asg.cliche-020310.jar bcprov-jdk16-146.jar ddmlib.jar dexmaker-20120622.jar jython-standalone-2.5.3.jar log4j-1.2.17.jar plugins.jar tools.jar |
Required Permissions | android.permission.INTERNET |
Asset File Names | assets\bcprov-jdk16-146.jar assets\isec.store assets\isectest.store assets\lighttpd.cer assets\localhost.store assets\tentwo.store assets\yourapp.store |
The license information of android-ssl-bypass is as follows:
Copyright (c) 2012, iSEC Partners. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the ...
There are 1 image files in android-ssl-bypass. The names of the image files are listed as follows.
ic_action_search.png
The following screenshort is generated from the image listed above.