patrickfav / uber-apk-signerLinks
A cli tool that helps signing and zip aligning single or multiple Android application packages (APKs) with either debug or provided release certificates. It supports v1, v2 and v3 Android signing scheme has an embedded debug keystore and auto verifies after signing.
☆2,478Updated 2 years ago
Alternatives and similar repositories for uber-apk-signer
Users that are interested in uber-apk-signer are comparing it to the libraries listed below
Sorting:
- Script to root AVDs running with QEMU Emulator from Android Studio☆1,721Updated 2 years ago
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,412Updated last week
- Android Reverse-Engineering Workbench for VS Code☆3,704Updated 2 months ago
- Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)☆2,953Updated 5 years ago
- Open-source, cross platform Qt6 based IDE for reverse-engineering Android application packages. It features a friendly IDE-like layout in…☆3,134Updated last month
- Hand-crafted Frida examples☆2,511Updated last year
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆1,319Updated 2 weeks ago
- Recreate Java code from Smali☆540Updated 2 years ago
- A Magisk/KernelSU module that automatically adds user certificates to the system root CA store☆2,335Updated 7 months ago
- smalidea is a smali language plugin for IntelliJ IDEA☆689Updated 2 years ago
- Powerful android apk editor - aapt/aapt2 independent☆1,933Updated last month
- 🤖 A CLI application that automatically prepares Android APK files for HTTPS inspection☆4,890Updated last year
- An automatic obfuscation tool for Android apps that works in a black-box fashion, supports advanced obfuscation features and has a modula…☆1,239Updated last year
- Android virtual machine and deobfuscator☆4,621Updated 3 years ago
- A collection of my Frida instrumentation scripts to reverse engineer mobile apps and more.☆1,553Updated last month
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).☆890Updated 9 years ago
- Frida scripts to rewrite mobile applications at runtime to directly MitM all HTTPS traffic☆1,977Updated this week
- ☆948Updated 4 years ago
- Remove Certificate Pinning from APKs☆894Updated 3 months ago
- Documentation:☆1,609Updated 2 years ago
- smali/baksmali☆6,598Updated 2 years ago
- Disassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as p…☆681Updated 9 months ago
- Android backup extractor☆2,491Updated last week
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆2,963Updated this week
- A command line tool to download Android applications directly from the Google Play Store by specifying their package name (an initial one…☆1,187Updated last year
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,122Updated 3 years ago
- Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)☆3,403Updated 2 years ago
- Google Play Downloader via Command line☆1,110Updated 4 years ago
- Install Magisk on Official Android Emulator☆756Updated 2 years ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,818Updated 2 years ago