Knowing how frustrating certificate pinning can be when trying to intercept an app’s traffic, I was really excited by this post about being able to quickly and easily bypass certificate pinning (which was shared here).

Unfortunately, it still required cloning a git repo, installing NPM, then installing the project dependencies, then running a local web server, in order to use it.

So here is a publicly available instance of reversing.works’ work which should allow anyone to use it without having to install anything (except for their intercepting proxy of choice). Make sure to check their blog and leave a star on their repo if you find this useful