MagiskTrustUserCerts VS xmppmitm

Compare MagiskTrustUserCerts vs xmppmitm and see what are their differences.

MagiskTrustUserCerts

A Magisk/KernelSU module that automatically adds user certificates to the system root CA store (by NVISOsecurity)

xmppmitm

XMPP Man-in-the-Middle, quick & dirty (by iamultra)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
MagiskTrustUserCerts xmppmitm
3 1
1,575 41
4.7% -
0.0 10.0
6 months ago about 10 years ago
Shell Python
- -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

MagiskTrustUserCerts

Posts with mentions or reviews of MagiskTrustUserCerts. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-03-20.
  • Inspecting http traffic from mobile phone applications
    1 project | /r/AskNetsec | 24 Jan 2023
    I am doing this right now. I'm using burp to proxy the traffic from a mobile application to test it's APIs. I did the following: 1. Root device and install Magisk 2. Connect phone to computer running burp and Android Debug Bridge. 3. Establish proxy connection using adb tunnel and ProxyDroid app. 4. Download Burp certificate to phone (it's stopped in User trust store but needs to be put in System. 5. Use the following Magisk module. MagiskTrustUserCerts 6. Profit
  • Mitmproxy 8
    10 projects | news.ycombinator.com | 20 Mar 2022
    This is true, by default Android apps do not trust user-installed certificate authorities. IMO the easiest solution if you're doing security testing on a dedicated device is MagiskTrustUserCerts[1]. If you're not testing on a dedicated device or you don't want to root the device, I'd recommend using the objection[2] tool which has a guided mode for patching an apk, and you can modify the manifest to add your CA or to trust all user-installed CAs.

    [1]: https://github.com/NVISOsecurity/MagiskTrustUserCerts

    [2]: https://github.com/sensepost/objection/wiki/Patching-Android...

  • Scraping an Android App
    1 project | /r/learnpython | 23 Feb 2022
    2) in magisk install https://github.com/NVISOsecurity/MagiskTrustUserCerts

xmppmitm

Posts with mentions or reviews of xmppmitm. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-03-20.
  • Mitmproxy 8
    10 projects | news.ycombinator.com | 20 Mar 2022
    I was reverse engineering my microwave a few years ago and couldn't MITM on XMPP because of the TLS so I used a jailbroken iPhone and was able to "swizzle" the Objective-C methods to log the data at a method right before encryption started. Fun.

    There was another XMPP MITM I could have used, but I think I was already invested in figuring out the first idea before I learned of the simpler, existing way:

    https://github.com/BrianHenryIE/XMPPFrameworkLogger

    https://github.com/iamultra/xmppmitm

What are some alternatives?

When comparing MagiskTrustUserCerts and xmppmitm you can also consider the following projects:

mitmpcap - export mitmproxy traffic to PCAP file

super-auto-pets - A tool to allow for viewing of arbitrary Super Auto Pets replays

hetty - An HTTP toolkit for security research.

ndbproxy - A proxy/bridge that runs between a Node.JS debug server and a Chromium devtools client and adds some additional features.

XMPPFrameworkLogger - An iOS jailbreak tweak to log (MITM) XMPP communication.

mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

objection - 📱 objection - runtime mobile exploration