Skip to content

Instantly share code, notes, and snippets.

View bes-internal's full-sized avatar
.

Vladimir Varlamov bes-internal

.
View GitHub Profile
@bes-internal
bes-internal / patch_apk_for_sniffing.md
Created June 9, 2022 22:30 — forked from unoexperto/patch_apk_for_sniffing.md
How to patch Android app to sniff its HTTPS traffic with self-signed certificate

How to patch Android app to sniff its HTTPS traffic with self-signed certificate

  • Download apktool from https://ibotpeaches.github.io/Apktool/
  • Unpack apk file: java -jar /home/expert/work/tools/apktool.jar d net.flixster.android-9.1.3@APK4Fun.com.apk
  • Modify AndroidManifest.xml by adding android:networkSecurityConfig="@xml/network_security_config" attribute to application element.
  • Create file /res/xml/network_security_config.xml with following content:
<?xml version="1.0" encoding="utf-8"?>
<network-security-config>
    <base-config>
Title: Perl 5.26 Unmasking Warning [affects all users]
To: gentoo-dev@lists.gentoo.org, gentoo-user@lists.gentoo.org
We're finally at a point where we're nearing the unmasking[1] of Perl 5.26 and making it visible to ~arch users, and a
"news item" on this matter will appear shortly.
Due to a collection of various problems faced in this version, extensive amounts of work has been needed to simply deliver
an ~arch release that isn't incredibly visibly broken[1][2]
Subsequently, this will require a lot of care from end users who use ~arch versions of Perl, specifically as