Skip to content

0xSHAK1B/Facebook-SSL-Pinning-Bypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

59 Commits
 
 
 
 
 
 

Repository files navigation

Facebook SSL Pinning Bypass for Android (2026) – Intercept & Capture HTTPS Traffic

Telegram Android ARM64 x86_64 Last Updated

Bypass Facebook's native SSL/TLS certificate pinning on Android by patching libcoldstart.so — intercept, inspect, and analyze HTTPS network traffic on both rooted and non-rooted devices. Working as of 2026.


📖 Overview

This project provides a pre-patched libcoldstart.so with the certificate verification logic disabled at the binary level, enabling security researchers, penetration testers, and developers to:


🎥 Proof of Concept

Image

▶️ Watch the Full Video Demonstration


📋 Supported Facebook Version

App Version Architecture Status
Facebook for Android 556.1.0.63.64 arm64-v8a ✅ Bypassed
Facebook for Android 556.1.0.63.64 x86_64 ✅ Bypassed
Facebook for Android 470.0.0.61.82 arm64-v8a ✅ Bypassed (Demo — available in Releases)

Need a newer version? Facebook updates frequently. For the latest patched libcoldstart.so compatible with the current Facebook version, contact me on Telegram.


📱 Requirements

Option A: Physical Android Device (Rooted or Non-Rooted)

  • Android phone or tablet running a compatible Facebook version
  • ADB access (USB debugging enabled, or wireless ADB)
  • A traffic interception proxy:
    • Reqable — modern UI, excellent mobile support
    • Proxypin — free, lightweight, no-root option

Option B: Android Emulator (PC)

  • Windows/macOS/Linux PC with an Android emulator:
    • Nox Player — enable root access in settings
    • LDPlayer — enable root access in settings
  • A MITM proxy tool:

Note: Root or elevated access is required.


🚀 Bypass Procedure

Step 1 — Replace the Original Library

Push the patched libcoldstart.so into Facebook's lib directory using ADB:

adb push /path/to/patched/libcoldstart.so /data/data/com.facebook.katana/lib-compressed/libcoldstart.so

Step 2 — Set Correct Permissions

Ensure the replaced library has the correct permissions so the app can load it:

adb shell chmod 755 /data/data/com.facebook.katana/lib-compressed/libcoldstart.so

Step 3 — Configure Your MITM Proxy

  1. Set up your preferred proxy tool and start listening on the designated port.
  2. Install and trust the proxy's CA certificate on the Android device or emulator.
  3. Configure the device's Wi-Fi proxy settings to route traffic through your proxy.

Step 4 — Force-Stop, Launch & Capture

adb shell am force-stop com.facebook.katana
adb shell monkey -p com.facebook.katana -c android.intent.category.LAUNCHER 1

Open your proxy tool — you should now see Facebook's HTTPS traffic flowing through in cleartext.

Tip: Always force-stop Facebook before relaunching to guarantee the patched library is loaded from disk rather than from a cached process.


📬 Contact & Latest Builds

For the most up-to-date patched libraries, version-specific support, or custom bypass requests:

Telegram


🏷️ Keywords

facebook ssl pinning bypass 2026 · facebook certificate pinning bypass android · facebook mitm proxy 2026 · facebook https traffic interception · facebook burp suite android · libcoldstart.so patch · facebook native ssl bypass · meta facebook security research · facebook api reverse engineering · android ssl pinning bypass no root · facebook tls bypass · facebook proxy capture · facebook network traffic analysis · bypass ssl pinning android 2026 · facebook pentesting android · mobile security research facebook · facebook certificate verification bypass · facebook arm64 binary patch