π± Install Reqable CA Certificate to System CA Store
Tested on Android 15 with SukiSU v40201
This Magisk/KernelSU/APatch module installs the Reqable CA Certificate into the Android System CA Store, enabling HTTPS traffic interception with the Reqable app.
β οΈ IMPORTANT: You must export and add YOUR OWN Reqable certificate! Each Reqable installation generates a UNIQUE certificate.
| Feature | Description |
|---|---|
| π§ Multi-Root Support | Works with Magisk, KernelSU, SukiSU, APatch |
| π± Wide Android Support | Android 5.0 - 15 (API 21-35) |
| π APEX Bypass | Proper injection for Android 14+ conscrypt APEX |
| π₯οΈ WebUI Interface | Upload and manage certificates visually |
| π‘οΈ SELinux Compatible | Works with SELinux enforcing |
| πΎ Systemless | Does not modify /system partition |
| Device | Android | Root | Status |
|---|---|---|---|
| Redmi Note 8 Pro | 15 (API 35) | SukiSU v40201 | β Tested |
| Solution | Status | Notes |
|---|---|---|
| SukiSU | β Tested | Fully working with WebUI |
| KernelSU | β Supported | With WebUI support |
| Magisk | β Supported | v20.4+ required |
| APatch | β Supported | v10300+ required |
| Version | API | Status |
|---|---|---|
| Android 5.0 - 13 | 21-33 | β Standard Magic Mount |
| Android 14 | 34 | β APEX Bypass |
| Android 15 | 35 | β APEX Bypass (Tested) |
- Open Reqable app
- Go to Settings β HTTPS Capture β Root Certificate
- Tap Export Root CA
- Select System Format (.0)
- Save the file (e.g.,
2652b13d.0)
- Download
Reqable-Cert-Installer-v2.3.zip - Install via Magisk/KernelSU/SukiSU/APatch Manager
- Reboot device
- Open root manager β Find module β Tap WebUI button
- Tap Upload Certificate area
- Select your
.0certificate file - Tap Install Certificate
- Reboot to apply
π‘ Alternatively, copy certificate directly to
/data/adb/modules/reqable-cert-installer/system/etc/security/cacerts/
Access WebUI through your root manager's module settings:
| Feature | Description |
|---|---|
| π€ Upload Certificate | Upload .0, .pem, .crt, .cer files |
| π Status Monitor | View module and APEX injection status |
| π Re-inject | Manually trigger certificate injection |
| π View Logs | Check module operation logs |
| π Reboot | Quick reboot to apply changes |
Starting Android 14, CA certificates moved to APEX module (com.android.conscrypt).
This module implements:
- Namespace Injection - Mounts into zygote namespaces
- Dynamic Re-injection - Service script reinjects after boot
- Per-process Mount - All app processes see the certificate
# Check if certificate is in APEX
ls /apex/com.android.conscrypt/cacerts/*.0 | head -5
# View module logs
cat /data/local/tmp/ReqableCert.log# 1. Check logs
cat /data/local/tmp/ReqableCert.log
# 2. Manual re-inject
su -c "sh /data/adb/modules/reqable-cert-installer/post-fs-data.sh"
# 3. Force stop and reopen Reqable- SukiSU/KernelSU: Settings β Enable "Allow untrusted modules"
- APatch: Settings β Security β Enable "Allow unknown sources"
- Ensure
webroot/index.htmlexists in module - Check if root manager supports WebUI
- Try reinstalling module
reqable-cert-installer/
βββ META-INF/com/google/android/
β βββ update-binary
β βββ updater-script
βββ system/etc/security/cacerts/
β βββ [YOUR_CERTIFICATE.0]
βββ webroot/
β βββ index.html # WebUI
βββ module.prop
βββ customize.sh # Installation script
βββ post-fs-data.sh # APEX injection
βββ service.sh # Post-boot injection
βββ action.sh # Action button handler
βββ uninstall.sh # Cleanup script
- β Auto-detect certificate file (no hardcoded .0)
- β User uploads their own certificate
- β Fixed WebUI module status detection
- β Fixed changelog display in SukiSU (inline format)
- β Improved SukiSU/KernelSU/APatch compatibility
- β Fixed WebUI file picker for Android WebView
- β Auto-close logs on action buttons
- β Improved status badges and indicators
- β Tested on SukiSU v40201 + Android 15
- β Enhanced APEX namespace injection
- β Added WebUI for certificate management
- β Improved SukiSU compatibility
- β Enhanced APEX bypass for Android 14+
- β Added KernelSU/APatch/SukiSU support
- β Added Android 15 support
- β Improved APEX bypass
GPL-3.0 License - See LICENSE for details.
- firdausmntp - Author & Maintainer
- topjohnwu - Magisk Framework
- tiann - KernelSU Framework
- pomelohan - SukiSU Framework
- bmax121 - APatch Framework