Skip to content

Commit 1f67ff3

Browse files
Revise README for TikTok SSL Pinning Bypass
Updated README to enhance clarity and provide detailed instructions for bypassing TikTok SSL pinning on Android. Added support information, requirements, and contact details.
1 parent 2fc1115 commit 1f67ff3

File tree

1 file changed

+101
-2
lines changed

1 file changed

+101
-2
lines changed

README.md

Lines changed: 101 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,101 @@
1-
# TIKTOK-SSL-Pinning-Bypass
2-
TikTok SSL Pinning Bypass for Android – intercept TikTok traffic.
1+
# TikTok SSL Pinning Bypass for Android (2026) – Intercept & Capture HTTPS Traffic
2+
3+
[![Telegram](https://img.shields.io/badge/💬_Chat_on_Telegram-2CA5E0?style=for-the-badge&logo=telegram&logoColor=white&labelColor=121212&color=26A5E4&logoWidth=20)](https://t.me/MUH4MM4DSH4KIB)
4+
![Android](https://img.shields.io/badge/Android-3DDC84?style=for-the-badge&logo=android&logoColor=white)
5+
![ARM64](https://img.shields.io/badge/ARM64--v8a-Supported-blue?style=for-the-badge)
6+
![x86_64](https://img.shields.io/badge/x86__64-Supported-blue?style=for-the-badge)
7+
8+
> Bypass TikTok SSL certificate pinning on Android to intercept, inspect, and analyze HTTPS network traffic — works on both **rooted** and **non-rooted** devices.
9+
10+
---
11+
12+
## 📖 Overview
13+
14+
This project provides a pre-patched **TikTok APK** with SSL/TLS certificate pinning disabled, enabling security researchers and developers to capture and analyze TikTok's HTTPS traffic using standard MITM proxy tools. Inspect API endpoints, video feed requests, authentication flows, analytics payloads, and content delivery mechanisms used by one of the world's most popular social media platforms.
15+
16+
**Key highlights:**
17+
18+
- ✅ No root required (also supports rooted devices)
19+
- ✅ Compatible with Android emulators (Nox, LDPlayer, BlueStacks)
20+
- ✅ Works with popular proxy tools (Burp Suite, Mitmproxy, Reqable, Proxypin)
21+
- ✅ ARM64-v8a & x86_64 architecture support
22+
- ✅ Full app functionality preserved — browse, watch, and interact normally
23+
24+
---
25+
26+
## 🎥 Proof of Concept
27+
28+
<img width="720" height="1640" alt="Image" src="https://github.com/user-attachments/assets/12a3f501-437d-49b2-8a12-dd1ab1c054e5" />
29+
30+
31+
32+
▶️ [**Watch the Full Video Demonstration**](https://github.com/user-attachments/assets/9f0fcfdb-8d29-4c08-82f5-fc985400fdb2)
33+
34+
---
35+
36+
## 📋 Supported TikTok Version
37+
38+
| App | Package | Version | Status |
39+
|-----|---------|---------|--------|
40+
| TikTok | `com.zhiliaoapp.musically` | **43.9.3** | ✅ Bypassed |
41+
42+
> For the **latest bypassed TikTok APK**, [contact me on Telegram](https://t.me/MUH4MM4DSH4KIB).
43+
44+
---
45+
46+
## ⚙️ Supported Architectures
47+
48+
| Architecture | Support |
49+
|---|---|
50+
| `arm64-v8a` ||
51+
| `x86_64` ||
52+
53+
---
54+
55+
## 📱 Requirements
56+
57+
### Option A: Physical Android Device
58+
59+
- Android phone or tablet (**rooted or non-rooted**)
60+
- A traffic interception proxy tool:
61+
- [Proxypin](https://proxypin.com) — free, lightweight
62+
- [Reqable](https://reqable.com) — feature-rich, modern UI
63+
64+
### Option B: Android Emulator (PC)
65+
66+
- Windows PC with one of the following emulators installed:
67+
- [Nox Player](https://www.bignox.com/)
68+
- [LDPlayer](https://www.ldplayer.net/)
69+
- [BlueStacks](https://www.bluestacks.com/)
70+
- A desktop MITM proxy tool:
71+
- [Burp Suite](https://portswigger.net/burp) — industry standard
72+
- [Mitmproxy](https://mitmproxy.org/) — open source
73+
- [Reqable](https://reqable.com)
74+
- [Proxypin](https://proxypin.com)
75+
76+
---
77+
78+
## 🚀 Bypass Procedure
79+
80+
1. **Uninstall** the official TikTok app from your device (if installed).
81+
2. **Download** the SSL pinning bypassed TikTok APK from this repository.
82+
3. **Install** the patched APK on your Android device or emulator.
83+
4. **Configure** your proxy tool of choice (Proxypin, Reqable, Burp Suite, or Mitmproxy) to intercept traffic.
84+
5. **Launch TikTok** and start capturing HTTPS requests and responses.
85+
86+
> **Tip:** Install and trust the proxy's CA certificate on your device for full HTTPS decryption. Force-stop and relaunch the app if traffic doesn't appear immediately.
87+
88+
---
89+
90+
91+
## 📬 Contact & Latest Builds
92+
93+
For the **most up-to-date** SSL pinning bypassed TikTok APK, reach out directly:
94+
95+
[![Telegram](https://img.shields.io/badge/💬_Chat_on_Telegram-2CA5E0?style=for-the-badge&logo=telegram&logoColor=white&labelColor=121212&color=26A5E4&logoWidth=20)](https://t.me/MUH4MM4DSH4KIB)
96+
97+
---
98+
99+
## 🏷️ Tags
100+
101+
`tiktok ssl pinning bypass` · `tiktok certificate pinning` · `tiktok mitm` · `tiktok traffic interception` · `tiktok burp suite` · `tiktok proxy android` · `tiktok https decrypt` · `tiktok api reverse engineering` · `android ssl bypass no root` · `tiktok ssl bypass 2025` · `tiktok network analysis` · `tiktok apk patched` · `bytedance ssl bypass` · `tiktok private api` · `tiktok api endpoints` · `com.zhiliaoapp.musically`

0 commit comments

Comments
 (0)