avast / apkverifier
APK Signature verification in Go. Supports scheme v1, v2 and v3 and passes Google apksig's testing suite.
☆81Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for apkverifier
- APK manifest & resources parsing in Golang.☆125Updated 3 months ago
- sud - a su daemon for corellium devices☆25Updated 3 years ago
- Android Unpacking Automation using Corellium Devices☆130Updated 4 years ago
- A fork of selinux-inject ( https://bitbucket.org/joshua_brindle/sepolicy-inject )☆109Updated 6 years ago
- Utilitiy for working with Android firmware .img files☆31Updated 5 years ago
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆204Updated 10 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆97Updated 7 years ago
- Easy to use Android service wrapper☆76Updated 7 months ago
- Simple example of jadx plugin☆19Updated last month
- A "shim" for loading native jni files for Android active debugging☆172Updated last year
- Script to inject frida gadget into APK☆33Updated 4 years ago
- Unofficial port of setools to Android with additional sepolicy-inject utility included☆250Updated 7 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆82Updated 4 months ago
- Android library for detecting Android virtual containers.☆67Updated 3 years ago
- PoC to bypass Android restrictions☆196Updated 5 years ago
- A toolbox for detecting and countering anti-sandbox behaviors in Android apps☆54Updated 5 years ago
- Deckard performs static and dynamic binary analysis on Android APKs to extract Xposed hooks☆77Updated 2 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆89Updated 6 years ago
- Shared Library Injector on Android☆142Updated 4 years ago
- Rust conversion (in-progress) of https://github.com/dweinstein/node-google-play.☆24Updated 3 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…