simon-weber / gpsoauthLinks
A python client library for Google Play Services OAuth.
☆120Updated 5 months ago
Alternatives and similar repositories for gpsoauth
Users that are interested in gpsoauth are comparing it to the libraries listed below
Sorting:
- Google Play API for Python☆64Updated 11 months ago
- Protobuf schemas for decoding Google Play Services network traffic on Android phones☆32Updated 11 months ago
- Reverse engineer protobuf from javanano☆29Updated 8 years ago
- Making protobuf request to Android anti-abuse service☆28Updated 6 years ago
- Protobuf metadata extraction tool☆131Updated 13 years ago
- Frida tool to dump an NSS Key Log for Wireshark, from a process using dynamically linked OpenSSL (or BoringSSL)☆117Updated 7 years ago
- This script automates the task of patching an apk with frida-gadget☆166Updated 5 months ago
- Fetch Android appdata/ from Google Drive☆77Updated 4 years ago
- command line tools using the node-google-play library☆74Updated 7 years ago
- A "shim" for loading native jni files for Android active debugging☆181Updated 3 years ago
- WhatsApp's handshake implementation using Noise Protocol☆77Updated last year
- Google Play Unofficial Python API☆436Updated 2 years ago
- Library for downloading APK files from the Google Play store☆65Updated 6 years ago
- Python3 Parser for Android XML file and get Application Name without using Androguard☆145Updated 7 months ago
- ☆253Updated 3 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆123Updated 6 years ago
- ab_decrypt.py, an educational python tool to decrypt Android backups☆47Updated 3 years ago
- Pretends to be a phone to get a legit android_id☆137Updated 10 years ago
- SafetyNet Jar download & extractor utility☆38Updated 8 years ago
- Using Apktool and Frida to do reverse engineering on Android Apk.☆69Updated 6 years ago
- Blackbox protobuf is a library for decoding and modifying arbitrary protobuf messages without the protobuf type definition.☆43Updated 3 years ago
- Get details and download apps from https://play.google.com by emulating an Android (Nexus 5X) device by default. For a rust version of th…☆279Updated 4 years ago
- Decode proto buffer without message definition☆80Updated 2 years ago
- OpenPST - Phone servicing tool for Qualcomm SoC devices☆19Updated 9 years ago
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆409Updated 2 years ago
- Proxy calls to the Widevine CDM and dump stream and call data☆38Updated 3 years ago
- apksigtool - parse/verify/clean/sign android apk (signing block)☆49Updated last year
- Bypass Snapchat certificate Pinning using Frida.☆44Updated 7 years ago
- Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431☆360Updated 9 years ago
- Full TrustZone exploit for MSM8974☆143Updated 9 years ago