Bypass TikTok SSL pinning on Android devices.
Supported ABIs: armeabi-v7a
, arm64-v8a
The Latest version: v31.5.3
Bitcoin: bc1q6kvvun3cfm5kadesxflntszp8z9lqesra35law
Ethereum: 0x47633Ef59b0F765b7f8047b0A56230cfeBB34027
USDC: 0x47633Ef59b0F765b7f8047b0A56230cfeBB34027
USDT: 0x47633Ef59b0F765b7f8047b0A56230cfeBB34027
Download the latest patched APK:
Requires frida-tools and radare2
python gen_script.py -i <your apk>
frida -U -l .\ssl_bypass.js -f com.zhiliaoapp.musically
You can create your own patched APK.
- Install java JRE:
sudo apt install default-jre
- Install apksigner:
sudo apt install apksigner
- Install zipalign:
sudo apt install zipalign
- Install radare2:
sudo apt install radare2
Note: apksigner and zipalign can also be found in android sdk build-tools
- Install java JRE
- Download build-tools and unzip
- Add unzip folder to path variable
- Install radare2 and add to path
- Download tiktok apk file.
- Install requirements >
pip install -r requirements.txt
- Run script >
python patch_apk.py -i <input apk> -o <output apk>
After that an patched apk file should be generated.
- Install tiktok from Play Store or from the apk
- Pull
libsscronet.so
from the phone
adb shell
#inside adb shell
su
apk=$(pm path com.zhiliaoapp.musically | cut -d':' -f2)
app_dir=$(dirname $apk)
libsscronet=$app_dir/lib/arm64/libsscronet.so #for arm replace arm64 with arm
echo $libsscronet
#/data/app/~~MaV1k6AHxSX2VmtJHZXXZg==/com.zhiliaoapp.musically-qb3IhNrRlxGAHW93wN_haw==/lib/arm64/libsscronet.so
cp "$libsscronet" /sdcard/libsscronet.so
exit
exit
#outsite adb shell
adb pull /sdcard/libsscronet.so
- Run
python patch_lib.py -i libsscronet.so -a [arm64-v8a|armeabi-v7a]
- After
libsscronet_patched.so
is created we can push it in to the phone
adb push libsscronet_patched.so /sdcard/libsscronet_patched.so
adb shell
#inside adb shell
su
apk=$(pm path com.zhiliaoapp.musically | cut -d':' -f2)
app_dir=$(dirname $apk)
libsscronet=$app_dir/lib/arm64/libsscronet.so #for arm replace arm64 with arm
rm "$libsscronet"
cp /sdcard/libsscronet_patched.so "$libsscronet"
exit
exit
You can use a tool like mitmproxy or Burp Suite to intercept the network.
- Install patched APK in the device
- Install mitmproxy or Burp Suite
- Set up proxy for wifi settings or run:
adb shell settings put global http_proxy <proxy>
Now you should be able to see the network traffic.
To view the logcat run:
adb logcat -s "TIKTOK_SSL_PINNING_BYPASS:V"