interceptor_frida_attach
Attach Frida to an Android app and inject SSL unpinning and proxy redirect scripts to bypass certificate pinning and intercept traffic.
Instructions
Attach to an Android app via Frida and inject SSL unpinning + proxy redirect scripts. Bypasses certificate pinning, OkHttp CertificatePinner, TrustManager, and native TLS verification.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| serial | Yes | ADB device serial | |
| app_name | No | App process name or package identifier | |
| pid | No | Process ID to attach to (alternative to app_name) |