threads-api
threads-api copied to clipboard
Reverse engineering process
Hi! I was also in the process of reverse engineering the Threads API when I stumbled upon your repository. Do you plan on documenting your reverse engineering process? I think it would be very valuable! :)
Hi any updates on this?
Prerequisites:
- Android device with root access
- Download latest Frida Server for Android
- Install frida-tools:
pip install frida-tools - Install adb (Android Debug Bridge): https://developer.android.com/studio/releases/platform-tools
- Install mitmproxy: https://www.mitmproxy.org/downloads/
Instructions:
# Set up the proxy server
mitmweb --listen-host 0.0.0.0
# Use the proxy on your Android device
adb shell settings put global http_proxy $YOUR_IP:8080
# Copy frida-server onto Android device
adb push ~/Downloads/frida-server-$VERSION-android-$ARCH /data/local/tmp/frida-server
adb shell "chmod 755 /data/local/tmp/frida-server"
# Start frida-server in the background
adb shell "/data/local/tmp/frida-server &"
# Spawn the app with a Frida script
frida -U -f com.instagram.barcelona -l frida-ssl-bypass.js
Your homework is to write frida-ssl-bypass.js yourself (or find it on GitHub?)