patrickfav / uber-apk-signerLinks
A cli tool that helps signing and zip aligning single or multiple Android application packages (APKs) with either debug or provided release certificates. It supports v1, v2 and v3 Android signing scheme has an embedded debug keystore and auto verifies after signing.
☆2,316Updated last year
Alternatives and similar repositories for uber-apk-signer
Users that are interested in uber-apk-signer are comparing it to the libraries listed below
Sorting:
- Android Reverse-Engineering Workbench for VS Code☆3,529Updated last year
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,306Updated 3 months ago
- Open-source, cross platform Qt based IDE for reverse-engineering Android application packages.☆3,063Updated last year
- A Magisk/KernelSU module that automatically adds user certificates to the system root CA store☆2,102Updated 2 months ago
- Script to root AVDs running with QEMU Emulator from Android Studio☆1,646Updated last year
- Frida scripts to directly MitM all HTTPS traffic from a target mobile application☆1,589Updated last week
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆1,199Updated 3 weeks ago
- Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)☆2,912Updated 4 years ago
- smalidea is a smali language plugin for IntelliJ IDEA☆684Updated 2 years ago
- Powerful android apk editor - aapt/aapt2 independent☆1,596Updated 3 weeks ago
- Android virtual machine and deobfuscator☆4,580Updated 3 years ago
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).☆860Updated 8 years ago
- Recreate Java code from Smali☆527Updated 2 years ago
- 🤖 A CLI application that automatically prepares Android APK files for HTTPS inspection☆4,654Updated last year
- Hand-crafted Frida examples☆2,472Updated 9 months ago
- ☆942Updated 3 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,110Updated 2 years ago
- Flutter Reverse Engineering Framework☆2,198Updated 2 weeks ago
- Disassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as p…☆663Updated 4 months ago
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆2,852Updated 3 months ago
- Flutter Mobile Application Reverse Engineering Tool☆1,770Updated last month
- Remove Certificate Pinning from APKs☆762Updated last month
- Install Magisk on Official Android Emulator☆742Updated last year
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,754Updated 2 years ago
- smali/baksmali☆6,535Updated last year
- Powerful yet easy to use APK editor for PC and Mac.☆1,340Updated 7 months ago
- Automatic Android interception & debugging with HTTP Toolkit, for Android☆566Updated 6 months ago
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,443Updated 4 years ago
- A collection of my Frida instrumentation scripts for reverse engineering of mobile apps and more.☆1,413Updated 2 weeks ago
- A tool that helps you work with frida easily for Android platform☆576Updated 9 months ago