xxxyanchenxxx / Sigkill
一键绕过App签名验证
Stars: ✭ 172
Labels
Projects that are alternatives of or similar to Sigkill
Backdoor Apk
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
Stars: ✭ 1,766 (+926.74%)
Mutual labels: smali
Andtroj
A tool for integrating the Metasploit payload with Android's healthy programs and bypassing antivirus
Stars: ✭ 43 (-75%)
Mutual labels: smali
Hiding Passwords Android
A project to compare various secret/sensitive key hiding techniques in android.
Stars: ✭ 139 (-19.19%)
Mutual labels: smali
Jflte Gpe
Google Edition by Danvdh, Kryten2k35, Googy_Anas & Ktoonsez
Stars: ✭ 67 (-61.05%)
Mutual labels: smali
Tinysmaliemulator
A very minimalist smali emulator that could be used to "decrypt" obfuscated strings
Stars: ✭ 68 (-60.47%)
Mutual labels: smali
Treble experimentations
Notes about tinkering with Android Project Treble
Stars: ✭ 2,000 (+1062.79%)
Mutual labels: smali
Bytecode Viewer
A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
Stars: ✭ 12,606 (+7229.07%)
Mutual labels: smali
Droidjack
Este troyano para Android es uno de los más completos. Con él vamos a poder tener acceso a remoto a todo el dispositivo infectado, desde la agenda, las llamadas y los SMS hasta el micrófono y las cámaras del smartphone. Todo.
Stars: ✭ 44 (-74.42%)
Mutual labels: smali
Apkstudio
Open-source, cross platform Qt based IDE for reverse-engineering Android application packages.
Stars: ✭ 2,246 (+1205.81%)
Mutual labels: smali
Sublime Smali
A syntax highlighter for the Dalvik bytecode language, Smali
Stars: ✭ 157 (-8.72%)
Mutual labels: smali
Haxrat
A Android RAT with lots of features , check README for more information.
Stars: ✭ 135 (-21.51%)
Mutual labels: smali
SigKill
一键绕过App签名验证。实现原理是Hook了PackaegManager,返回我们指定的签名。
Demo效果:
可以看到,第一次打印出的是真正的signatuer,后面经过hook后,就变了.....
如何使用,分成3步
首先将Libs/smali_lib中的代码复制到目标App的smali目录中,这步就不计入第一步了吧。
然后,
第一步:使用"Libs/签名获取.apk"获取到APK的真正签名信息,如下图
第二步:复制上一步的字符串并替换掉"Libs/smali/com/yc/pm/SignatureFake.smali"中的字符串:
.method private static getSigStr()Ljava/lang/String;
.locals 1
.prologue
.line 14
const-string/jumbo v0, "48,-126,2,-21,48,-126,2,84,-96,3,2,1,2,2,4,77,54,-9,-92,48,13,.......
return-object v0
.end method
第三步:在App的Application的attachBaseContext()函数中调用这行smali代码即可,smali:
invoke-static {}, Lcom/yc/pm/SignatureKill;->kill()V
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].