mmcloughlin / finsky
Google Play API for Python
☆62Updated last month
Alternatives and similar repositories for finsky:
Users that are interested in finsky are comparing it to the libraries listed below
- Library for downloading APK files from the Google Play store☆64Updated 5 years ago
- Reverse engineer protobuf from javanano☆29Updated 7 years ago
- Pretends to be a phone to get a legit android_id☆134Updated 9 years ago
- Stores email-password pairs, gives out Google Play Store tokens☆63Updated 5 years ago
- Google Play checkin utility. Creates a configurable hardware profile and gets a GSF ID for it.☆64Updated 7 years ago
- Google Play Unofficial Python API - not used by me anymore, feel free fork or cherry-pick commits☆40Updated 3 years ago
- Play with Google Play API :)☆578Updated last year
- Get details and download apps from https://play.google.com by emulating an Android (Nexus 5X) device by default. For a rust version of th…☆273Updated 3 years ago
- GUI for Frida -Scripts☆177Updated 8 years ago
- Look for interesting things in an APK and inject logging☆47Updated 11 years ago
- A "shim" for loading native jni files for Android active debugging☆175Updated 2 years ago
- Google Play Store protobuf API wrapper in java☆330Updated 4 years ago
- Google Play Unofficial Python API - This project was a PoC and is not maintained anymore. Please feel free to fork it and improve it in a…☆883Updated 7 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago
- Wrapper tool to identify the remote device and push device specific frida-server binary.☆43Updated 2 years ago
- Protobuf definitions for google play services.☆25Updated 4 years ago
- ☆91Updated 7 years ago
- crawl and download apps from google play☆42Updated 10 years ago
- android apk查壳工具源代码☆17Updated 9 years ago
- Bypassing SSL Pinning in Facebook Android App☆112Updated 5 years ago
- Miscellaenous DEX (Dalvik Executable) tools☆82Updated last year
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆88Updated 8 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆129Updated 9 years ago
- Binaries compiled for ARM☆71Updated 7 years ago
- SafetyNet Jar download & extractor utility☆36Updated 7 years ago
- Google Play Unofficial Python API☆425Updated last year
- a set of tools/scripts to obfuscate and manipulate dex files☆118Updated 10 years ago
- Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc☆94Updated 10 years ago
- Extended oatdump from AOSP platform/art repo☆134Updated 7 years ago