patrickfav / uber-apk-signerLinks
A cli tool that helps signing and zip aligning single or multiple Android application packages (APKs) with either debug or provided release certificates. It supports v1, v2 and v3 Android signing scheme has an embedded debug keystore and auto verifies after signing.
☆2,245Updated last year
Alternatives and similar repositories for uber-apk-signer
Users that are interested in uber-apk-signer are comparing it to the libraries listed below
Sorting:
- Android Reverse-Engineering Workbench for VS Code☆2,906Updated last year
- Open-source, cross platform Qt based IDE for reverse-engineering Android application packages.☆3,036Updated last year
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,253Updated 3 weeks ago
- Frida scripts to directly MitM all HTTPS traffic from a target mobile application☆1,466Updated this week
- smali/baksmali☆6,490Updated last year
- 🤖 A CLI application that automatically prepares Android APK files for HTTPS inspection☆4,332Updated 11 months ago
- A Magisk/KernelSU module that automatically adds user certificates to the system root CA store☆1,998Updated 2 weeks ago
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆1,147Updated this week
- smalidea is a smali language plugin for IntelliJ IDEA☆677Updated 2 years ago
- Android virtual machine and deobfuscator☆4,560Updated 3 years ago
- Powerful yet easy to use APK editor for PC and Mac.☆1,299Updated 5 months ago
- Powerful android apk editor - aapt/aapt2 independent☆1,448Updated last month
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,103Updated 2 years ago
- Simple to use root checking Android library and sample app☆2,693Updated 9 months ago
- Recreate Java code from Smali☆529Updated 2 years ago
- Install Magisk on Official Android Emulator☆727Updated last year
- the fastest and most powerful android decompiler(native tool working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS fi…☆4,481Updated last year
- Android backup extractor☆2,375Updated last month
- Disassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as p…☆652Updated 2 months ago
- 📱 objection - runtime mobile exploration☆8,244Updated 3 weeks ago
- Script to root AVDs running with QEMU Emulator from Android Studio☆1,594Updated last year
- Hand-crafted Frida examples☆2,437Updated 7 months ago
- Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)☆2,899Updated 4 years ago
- Remove Certificate Pinning from APKs☆712Updated 2 months ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,738Updated last year
- Documentation:☆1,593Updated 2 years ago
- ☆936Updated 3 years ago
- A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.☆1,341Updated last year
- Reverse engineering and pentesting for Android applications☆5,663Updated 3 months ago
- Android Dalvik bytecode patcher.☆434Updated 5 years ago