baltpeter / parse-playLinks
Library for fetching and parsing select data on Android apps from the Google Play Store via undocumented internal APIs.
☆33Updated last year
Alternatives and similar repositories for parse-play
Users that are interested in parse-play are comparing it to the libraries listed below
Sorting:
- Tool for reversing Google internal protobuf definitions☆143Updated 3 months ago
- Making frida less detectable by applying some patches. This follows the official Frida releases and publishes releases the same day. Do n…☆92Updated 2 weeks ago
- Google Play Unofficial Python API☆432Updated 2 years ago
- Decompile React Native Android/IOS Bundle.☆326Updated 2 years ago
- Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.☆384Updated 2 weeks ago
- Remove Certificate Pinning from APKs☆756Updated last month
- apkInspector is a tool designed to provide detailed insights into the zip structure of APK files, offering the capability to extract cont…☆74Updated 2 months ago
- Property extractor for Android apps☆300Updated 5 months ago
- Expose the Chrome extension API to puppeteer☆14Updated 4 years ago
- A tiny demo Android app using SSL pinning to block HTTPS MitM interception☆157Updated last month
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆405Updated 2 years ago
- reverse many of the transformations applied by minifiers and naïve obfuscators☆226Updated 3 years ago
- Simple python script that merges multiple "splitted" apk files into a single universal "fat" apk file that contains all native libraries …☆51Updated 11 months ago
- Bypass Facebook/Instagram Certificate Pinning for Android☆231Updated 3 years ago
- 🔮 Vindicate non-organic web traffic via MITM proxy☆67Updated last year
- apksigtool - parse/verify/clean/sign android apk (signing block)☆47Updated 10 months ago
- The script allows to bypass SSL pinning on Android >= 7 and makes APK file ready for HTTPS traffic inspection☆171Updated last year
- Protobuf schemas for decoding Google Play Services network traffic on Android phones☆26Updated 7 months ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆106Updated 2 years ago
- A collection of domain lists obtained from zone-walking TLDs. Updated daily.☆24Updated this week
- This script automates the task of patching an apk with frida-gadget☆157Updated last month
- Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode)☆527Updated last year
- A python client library for Google Play Services OAuth.☆114Updated last month
- APKrash is an Android APK security analysis toolkit focused on comparing APKs to detect tampering and repackaging.☆30Updated 3 weeks ago
- The backend of HTTP Toolkit☆501Updated this week
- Automatic Android interception & debugging with HTTP Toolkit, for Android☆565Updated 6 months ago
- A reverse engineering tool for decompiling and disassembling the React Native Hermes bytecode☆742Updated last year
- NO LONGER MAINTAINED - Android security & privacy analysis for the masses☆287Updated 2 years ago
- A web page that compiles methods used by Akamai, Datadome, and other bot detection solutions and WAF (Web Application Firewall) to identi…☆43Updated 4 years ago
- Passive TCP/IP Fingerprinting Tool. Run this on your server and find out what Operating Systems your clients are *really* using.☆372Updated last year