Skip to content

Install Reqable CA certificate to System CA Store. Supports Magisk/KernelSU/SukiSU/APatch. Android 5.0-15+ compatible.

License

Notifications You must be signed in to change notification settings

firdausmntp/reqable-cert-installer

Repository files navigation

πŸ” Reqable Certificate Installer

Version Android License

Magisk KernelSU SukiSU APatch

πŸ“± Install Reqable CA Certificate to System CA Store
Tested on Android 15 with SukiSU v40201


πŸ“‹ Description

This Magisk/KernelSU/APatch module installs the Reqable CA Certificate into the Android System CA Store, enabling HTTPS traffic interception with the Reqable app.

⚠️ IMPORTANT: You must export and add YOUR OWN Reqable certificate! Each Reqable installation generates a UNIQUE certificate.


✨ Key Features

Feature Description
πŸ”§ Multi-Root Support Works with Magisk, KernelSU, SukiSU, APatch
πŸ“± Wide Android Support Android 5.0 - 15 (API 21-35)
πŸ”“ APEX Bypass Proper injection for Android 14+ conscrypt APEX
πŸ–₯️ WebUI Interface Upload and manage certificates visually
πŸ›‘οΈ SELinux Compatible Works with SELinux enforcing
πŸ’Ύ Systemless Does not modify /system partition

πŸ“± Tested Compatibility

βœ… Verified Working

Device Android Root Status
Redmi Note 8 Pro 15 (API 35) SukiSU v40201 βœ… Tested

Root Solutions Support

Solution Status Notes
SukiSU βœ… Tested Fully working with WebUI
KernelSU βœ… Supported With WebUI support
Magisk βœ… Supported v20.4+ required
APatch βœ… Supported v10300+ required

Android Versions

Version API Status
Android 5.0 - 13 21-33 βœ… Standard Magic Mount
Android 14 34 βœ… APEX Bypass
Android 15 35 βœ… APEX Bypass (Tested)

πŸš€ Quick Start

Step 1: Export Certificate from Reqable

  1. Open Reqable app
  2. Go to Settings β†’ HTTPS Capture β†’ Root Certificate
  3. Tap Export Root CA
  4. Select System Format (.0)
  5. Save the file (e.g., 2652b13d.0)

Step 2: Install Module

  1. Download Reqable-Cert-Installer-v2.3.zip
  2. Install via Magisk/KernelSU/SukiSU/APatch Manager
  3. Reboot device

Step 3: Upload Certificate via WebUI

  1. Open root manager β†’ Find module β†’ Tap WebUI button
  2. Tap Upload Certificate area
  3. Select your .0 certificate file
  4. Tap Install Certificate
  5. Reboot to apply

πŸ’‘ Alternatively, copy certificate directly to /data/adb/modules/reqable-cert-installer/system/etc/security/cacerts/


πŸ–₯️ WebUI Features

Access WebUI through your root manager's module settings:

Feature Description
πŸ“€ Upload Certificate Upload .0, .pem, .crt, .cer files
πŸ“Š Status Monitor View module and APEX injection status
πŸ’‰ Re-inject Manually trigger certificate injection
πŸ“‹ View Logs Check module operation logs
πŸ”„ Reboot Quick reboot to apply changes

πŸ”§ Android 14+ APEX Bypass

Starting Android 14, CA certificates moved to APEX module (com.android.conscrypt).

This module implements:

  • Namespace Injection - Mounts into zygote namespaces
  • Dynamic Re-injection - Service script reinjects after boot
  • Per-process Mount - All app processes see the certificate

Verify Injection

# Check if certificate is in APEX
ls /apex/com.android.conscrypt/cacerts/*.0 | head -5

# View module logs
cat /data/local/tmp/ReqableCert.log

⚠️ Troubleshooting

"Certificate Not Installed" in Reqable

# 1. Check logs
cat /data/local/tmp/ReqableCert.log

# 2. Manual re-inject
su -c "sh /data/adb/modules/reqable-cert-installer/post-fs-data.sh"

# 3. Force stop and reopen Reqable

"Unknown Publisher" Error

  • SukiSU/KernelSU: Settings β†’ Enable "Allow untrusted modules"
  • APatch: Settings β†’ Security β†’ Enable "Allow unknown sources"

WebUI Not Loading

  1. Ensure webroot/index.html exists in module
  2. Check if root manager supports WebUI
  3. Try reinstalling module

πŸ“ Module Structure

reqable-cert-installer/
β”œβ”€β”€ META-INF/com/google/android/
β”‚   β”œβ”€β”€ update-binary
β”‚   └── updater-script
β”œβ”€β”€ system/etc/security/cacerts/
β”‚   └── [YOUR_CERTIFICATE.0]
β”œβ”€β”€ webroot/
β”‚   └── index.html          # WebUI
β”œβ”€β”€ module.prop
β”œβ”€β”€ customize.sh            # Installation script
β”œβ”€β”€ post-fs-data.sh         # APEX injection
β”œβ”€β”€ service.sh              # Post-boot injection
β”œβ”€β”€ action.sh               # Action button handler
└── uninstall.sh            # Cleanup script

πŸ“ Changelog

v2.3 (Current)

  • βœ… Auto-detect certificate file (no hardcoded .0)
  • βœ… User uploads their own certificate
  • βœ… Fixed WebUI module status detection
  • βœ… Fixed changelog display in SukiSU (inline format)
  • βœ… Improved SukiSU/KernelSU/APatch compatibility

v2.2

  • βœ… Fixed WebUI file picker for Android WebView
  • βœ… Auto-close logs on action buttons
  • βœ… Improved status badges and indicators
  • βœ… Tested on SukiSU v40201 + Android 15
  • βœ… Enhanced APEX namespace injection

v2.1

  • βœ… Added WebUI for certificate management
  • βœ… Improved SukiSU compatibility
  • βœ… Enhanced APEX bypass for Android 14+

v2.0

  • βœ… Added KernelSU/APatch/SukiSU support
  • βœ… Added Android 15 support
  • βœ… Improved APEX bypass

πŸ“„ License

GPL-3.0 License - See LICENSE for details.


πŸ™ Credits


πŸ”— Links

GitHub Issues Reqable

About

Install Reqable CA certificate to System CA Store. Supports Magisk/KernelSU/SukiSU/APatch. Android 5.0-15+ compatible.

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors