xmppmitm VS MagiskTrustUserCerts

Compare xmppmitm vs MagiskTrustUserCerts and see what are their differences.

xmppmitm

XMPP Man-in-the-Middle, quick & dirty (by iamultra)

MagiskTrustUserCerts

A Magisk/KernelSU module that automatically adds user certificates to the system root CA store (by NVISOsecurity)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
xmppmitm MagiskTrustUserCerts
1 3
41 1,575
- 4.7%
10.0 0.0
about 10 years ago 6 months ago
Python Shell
- -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

xmppmitm

Posts with mentions or reviews of xmppmitm. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-03-20.
  • Mitmproxy 8
    10 projects | news.ycombinator.com | 20 Mar 2022
    I was reverse engineering my microwave a few years ago and couldn't MITM on XMPP because of the TLS so I used a jailbroken iPhone and was able to "swizzle" the Objective-C methods to log the data at a method right before encryption started. Fun.

    There was another XMPP MITM I could have used, but I think I was already invested in figuring out the first idea before I learned of the simpler, existing way:

    https://github.com/BrianHenryIE/XMPPFrameworkLogger

    https://github.com/iamultra/xmppmitm

MagiskTrustUserCerts

Posts with mentions or reviews of MagiskTrustUserCerts. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-03-20.
  • Inspecting http traffic from mobile phone applications
    1 project | /r/AskNetsec | 24 Jan 2023
    I am doing this right now. I'm using burp to proxy the traffic from a mobile application to test it's APIs. I did the following: 1. Root device and install Magisk 2. Connect phone to computer running burp and Android Debug Bridge. 3. Establish proxy connection using adb tunnel and ProxyDroid app. 4. Download Burp certificate to phone (it's stopped in User trust store but needs to be put in System. 5. Use the following Magisk module. MagiskTrustUserCerts 6. Profit
  • Mitmproxy 8
    10 projects | news.ycombinator.com | 20 Mar 2022
    This is true, by default Android apps do not trust user-installed certificate authorities. IMO the easiest solution if you're doing security testing on a dedicated device is MagiskTrustUserCerts[1]. If you're not testing on a dedicated device or you don't want to root the device, I'd recommend using the objection[2] tool which has a guided mode for patching an apk, and you can modify the manifest to add your CA or to trust all user-installed CAs.

    [1]: https://github.com/NVISOsecurity/MagiskTrustUserCerts

    [2]: https://github.com/sensepost/objection/wiki/Patching-Android...

  • Scraping an Android App
    1 project | /r/learnpython | 23 Feb 2022
    2) in magisk install https://github.com/NVISOsecurity/MagiskTrustUserCerts

What are some alternatives?

When comparing xmppmitm and MagiskTrustUserCerts you can also consider the following projects:

super-auto-pets - A tool to allow for viewing of arbitrary Super Auto Pets replays

mitmpcap - export mitmproxy traffic to PCAP file

hetty - An HTTP toolkit for security research.

XMPPFrameworkLogger - An iOS jailbreak tweak to log (MITM) XMPP communication.

ndbproxy - A proxy/bridge that runs between a Node.JS debug server and a Chromium devtools client and adds some additional features.

mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

objection - 📱 objection - runtime mobile exploration