patrickfav / uber-apk-signerLinks
A cli tool that helps signing and zip aligning single or multiple Android application packages (APKs) with either debug or provided release certificates. It supports v1, v2 and v3 Android signing scheme has an embedded debug keystore and auto verifies after signing.
☆2,261Updated last year
Alternatives and similar repositories for uber-apk-signer
Users that are interested in uber-apk-signer are comparing it to the libraries listed below
Sorting:
- Open-source, cross platform Qt based IDE for reverse-engineering Android application packages.☆3,040Updated last year
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,254Updated last month
- Script to root AVDs running with QEMU Emulator from Android Studio☆1,605Updated last year
- Android Reverse-Engineering Workbench for VS Code☆3,354Updated last year
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆1,152Updated 2 weeks ago
- Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)☆2,901Updated 4 years ago
- Frida scripts to directly MitM all HTTPS traffic from a target mobile application☆1,489Updated last week
- smalidea is a smali language plugin for IntelliJ IDEA☆678Updated 2 years ago
- Recreate Java code from Smali☆528Updated 2 years ago
- Hand-crafted Frida examples☆2,443Updated 7 months ago
- Android virtual machine and deobfuscator☆4,561Updated 3 years ago
- Powerful android apk editor - aapt/aapt2 independent☆1,469Updated last month
- A Magisk/KernelSU module that automatically adds user certificates to the system root CA store☆2,015Updated 3 weeks ago
- Install Magisk on Official Android Emulator☆733Updated last year
- ☆936Updated 3 years ago
- 🤖 A CLI application that automatically prepares Android APK files for HTTPS inspection☆4,341Updated 11 months ago
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).☆849Updated 8 years ago
- An automatic obfuscation tool for Android apps that works in a black-box fashion, supports advanced obfuscation features and has a modula…☆1,197Updated 11 months ago
- Documentation:☆1,596Updated 2 years ago
- Disassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as p…☆653Updated 2 months ago
- A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.☆1,344Updated last year
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,740Updated 2 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,103Updated 2 years ago
- smali/baksmali☆6,495Updated last year
- A command line tool to download Android applications directly from the Google Play Store by specifying their package name (an initial one…☆1,163Updated 11 months ago
- Quark Agent - Your AI-powered Android APK Analyst☆1,479Updated this week
- Remove Certificate Pinning from APKs☆713Updated 2 months ago
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,443Updated 4 years ago
- the fastest and most powerful android decompiler(native tool working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS fi…☆4,495Updated last year
- Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)☆3,271Updated last year