Instagram iOS with SSL pinning bypassed / Instagram with certificate pinning bypassed. Get your private api endpoints now!
- DO NOT NEED JAILBREAK
- DO NOT NEED FRIDA
Bitcoin: bc1qlj6685zpthj6kp5fe7cu47pp80xk0d3tzg650m
Solana: 4a91vFCz8SjnqWiJpFuLWwWFpWdT9dZq13hG4o8icv2n
Litecoin: MFi28zedB78kaNiRpi9eBkFRTtGZNoxcWv
- Current version which was bypassed: 335.0.8
- You can now intercept all requests
- iOS Only
- Tested on iOS 15.4.1
- Any support is appreciated
- Download the IPA file
- Sideload the file (I personally suggest Sideloadly or TrollStore)
- Set up the proxy before starting the app (Was tested only with mitmproxy)
- Intercept
Icon | Bundle ID | Version | File Type | Download |
---|---|---|---|---|
com.burbn.instagram | 335.0.8 | IPA | Click here | |
com.burbn.instagram | 323.0.3 | IPA | Click here |
Message me on Telegram: @undecryptable
SSL pinning, also known as certificate pinning or public key pinning, is a security mechanism used in digital communication to enhance the security of a connection, particularly within the context of Secure Sockets Layer (SSL) or its successor, Transport Layer Security (TLS).
When a client (such as a web browser or a mobile app) connects to a server over HTTPS, the server presents its SSL/TLS certificate to prove its identity. Normally, the client verifies the server's certificate by checking if it is signed by a trusted Certificate Authority (CA). However, SSL pinning adds an extra layer of security by requiring the client to validate the server's certificate against a known, pre-configured set of certificates or public keys, rather than solely relying on the CA's trust chain.