MEDUZA can only unpin apps using iOS system SSL libs. So you run the app for second time, use the generated script, and catch the traffic with mitmproxy. Then MEDUZA generates a Frida script that fakes (=upnin) the collected certificates. MEDUZA is sitting quietly and collecting certificates used by the app to connect servers. First time, you run an app without sniffing and use it as usual. TBH, I hate open source, but the world is full of compromises. I created it for in-house use, but then decided to opensource it. It's a Frida-based tool, my replacement for SSLKillSwitch.