I’m running a security-focused research project on a popular mobile game and need targeted help to pull its encrypted traffic apart. The main goal is to lift the curtain on TLS/SSL flows, map how the app protects in-game transactions, and document any weaknesses. You will: • Build and refine Frida hooks that expose the app’s logic around network calls, transaction handlers, and certificate checks. • Defeat the certificate-pinning controls so every TLS request and response can be decrypted and replayed. • Wrap the hooks in clean Python automation that can drive the game through ADB, simulate gameplay events, and dump repeatable traces. • Use tools such as JADX or Ghidra whenever static insight speeds the dynamic work. Deliverables (checked on my side before sign-off): 1. A Frida script set that attaches reliably on both rooted and virtualized Android devices. 2. Python code (well-commented) that reproduces the required user flow and logs each decrypted request/response pair. 3. A concise report highlighting any vulnerabilities, odd certificate workflows, or exploitable logic you uncover, with reproduction steps. If you’re comfortable living inside Frida’s message loop, know your way around mitm TLS interception, and can script fast in Python, I’ll supply the APK and test accounts so we can start immediately.