The API wrapper for Clubhouse application (drop-in audio chat) based on online private API documentation and pwned sources by myself.
Warning
This API client comes without any warrenty. Also, using
master
branch is not recommended.
To install this repository as your dependency, use following command with authorized git client:
yarn add git+https://github.com/Seia-Soto/clubhouse-api#[TAG]
For working example, you can refer /example
folder of this repository.
Also, about parameters for each API call functions, you need to inspect functions manually with notes that included with functions.
Runs example code.
Create new prorfile JSON data by authenticating manually on command line shell.
To reverse engineer Clubhouse audio chat application, only thing we need is jailbroken device. Because there is nothing else except for SSL certificate pinning and we can bypass it even on iOS 14 which is the latest release of iOS by installing some tweaks.
Use Odyssey, if you're on iOS 13.6 or higher.
To jailbreak, I recommend you to use Unc0ver instead of others due to stability. Setup AltServer on your PC or Mac and then install Unc0ver
You're not able to use checkm8 exploit if you're on iPhone 11 or higher (higher than A11).
If you're on iOS 14 or higher version, use Checkra1n version 0.12.1 to jailbreak. This this time, you need to disable your iPhone's passcode manually before jailbreaking. Also, DO NOT USE LATEST RELEASE of checkra1n to avoid issue on A11.
If you install OpenSSH server to debug on remote PC, you need to CHANGE BOTH root
AND mobile
USER'S PASSWORD.
passwd root
passwd mobile
You can set up MITM proxy with following tools:
Install toolchains and follow steps to decrypt HTTPS traffics:
You need to configure fiddler via the official guide.
If you've setup MITM proxy, open http://mitm.it
on your iPhone, then install certificate.
To inspect HTTP packet, there are ways to bypass it easily.
Install required updates from Cydia for security reasons and install Filza File Manager or terminal emulator to install package file manually. Open following repo and download latest release from it. If you touch share button and then share the file to filza, you can directly install package file.
After installation, turn it on in settings app.
Install iTunes and Python3 on your PC and open iTunes after install. Connect to your iPhone shell via methods described in Wireshark remote debugging section. Clone following repository to some directory:
After, all things are ready, run script via following command:
python3 hook.py -n clubhouse -s frida-scripts\bypass-ssl-ios13.js
- The script also works on iOS 14.
By piping stream over SSH, you can also debug your iPhone's traffic with wireshark installed on PC.
Before doing this, install OpenSSH
and tcpdump
tweak on your iPhone and install Wireshark on your PC.
You may add following paths to system wide environment variable:
C:\Program Files\Wireshark
After setting up itunnel-mux
or 3uTools
from below, open new command line window and start debugging with built-in ssh on Windows 10.
ssh root@localhost -p 2222 -l root tcpdump -s 0 -U -n -w - -i any not port 22 | wireshark -k -i -
Download itunnel_mux_rev71.zip
from following webpage and add it to path.
At this time, you should install iTunes and Apple Mobile Support before continuing.
Open it and start proxy after connecting iPhone.
itunnel_mux --iport 22 --lport 22
Also, you can do this easier with 3uTools which only available on Windows.
Download and install it to your PC and connect iPhone via USB.
Then you can go to Toolbox
tab and click Open SSH Tunnel
to open SSH port locally.
About the API implemented in this project. Only special things will be typed.
The code is also available for common web browser as this project doesn't contain any code that requires additional C code build. However, there are many ban reports from web browser use, so if you want to use this on web browser, you should build proxy server.
Update 2021/02/21
Voice-related support will not present after today because it is PART OF AGORA, not CLUBHOUSE.
Actually, the capacity of voice support is already present in my repository since src/api/joinChannel.js
method implemented.
However, there is not enough information to keep users safe from unexpected bans, and I couldn't say You can use this to do Clubhouse!
.
Other unofficial repositories are already doing voice stuff with Agora SDK built for their language, but I couldn't say that is safe to use.
Because, commonly for who operating production service can see every users connecting to specific gateway and it is easy to detect what users are using if user didn't change any thing on official SDK.
In future, I am planning to port iOS's Agora voice SDK into Node.JS to reduce ban rate.
However, limitation of my iOS ecosystem knowledge, currently only official JavaScript SDK is available to use and there is a huge limitation, which requires web browser context.
For additional information about SDK, please refer:
NG is Next Generation in Agora Ecosystem.*
For Electron based applications, you can easily integrate Agora with my clubhouse-api package.
You can see the example that describes how to get RTM token stuff in src/structures/voice.js
.
For additional information about Electron SDK, please refer:
client.getStatic
method will return a cross-fetch
agent which having essential headers to query static files.
For example, you can download profile picture safely by using this method.
const download = url => {
const fs = require('fs')
const response = await app.getStatic(url)
const stream = fs.createWriteStream('./avatar.png')
return new Promise((resolve, reject) => {
response.body.pipe(stream)
response.body.on('error', reject)
stream.on('finish', resolve)
})
}
To override cross-fetch
option object, you need to provide re-usable object to profile.fetchOptions
.
const profile = {
...profiles.application.a304,
...profiles.locales.Korean,
fetchOptions: {
agent: ... // NOTE: For proxy stuff;
}
}
This repository is distributed with MIT License.