You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,6 +13,7 @@ The scripts can automatically handle:
13
13
* Patching many (all?) known certificate pinning and certificate transparency tools, to allow interception by your CA certificate even when this is actively blocked.
14
14
* On Android, as a fallback: auto-detection of remaining pinning failures, to attempt auto-patching of obfuscated certificate pinning (in fully obfuscated apps, the first request may fail, but this will trigger additional patching so that all subsequent requests work correctly).
15
15
* Disabling many common root & jailbreak detections.
16
+
* Blocking most HTTP/3 connections (all UDP to port 443), which may be inconvenient to intercept, ensuring apps fall back to HTTP/2 or HTTP/1.
16
17
17
18
## Android Getting Started Guide
18
19
@@ -93,14 +94,15 @@ Each script includes detailed documentation on what it does and how it works in
93
94
*`PROXY_HOST` - the IP address (IPv4) of the proxy server to use (not required if you're only unpinning)
94
95
* `PROXY_PORT` - the port of the proxy server to use (not required if you're only unpinning)
95
96
*`DEBUG_MODE` - defaults to `false`, but switching this to `true` will enable lots of extra output that can be useful for debugging and reverse engineering any issues.
97
+
*`BLOCK_HTTP3` - defaults to `true`, which blocks HTTP/3 by dropping all UDP connections to port 443.
96
98
97
99
This should be listed on the command line before any other scripts.
98
100
99
101
*`native-connect-hook.js`
100
102
101
103
Captures all network traffic directly, routing all connections to the configured proxy host & port.
102
104
103
-
This is a low-level hook that applies to _all_ network connections. This ensures that all connections are forcibly redirected to the target proxy server, even those which ignore proxy settings or make other raw socket connections.
105
+
This is a low-level hook that applies to _all_ network connections. This ensures that all connections are forcibly redirected to the target proxy server, even those which ignore proxy settings or make other raw socket connections, and also blocks HTTP/3 connections if enabled.
104
106
105
107
This hook applies to libc, and works for Android, Linux, iOS, and many other related environments.
0 commit comments