Skip to content

This was my research work in which I tried to by-pass the various SDCs recommended by OWASP, especially for the Financial Apps fetched from the Google Play Store.

Notifications You must be signed in to change notification settings

Nikhil1212/By-pass-SDCs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 

Repository files navigation

By-pass various Self-defense checks in Android App

This work produces the tampered version of the original app in such a way that it can by-pass the following Self-Defense-Checks if the related code is locatable from keyword-based search (i.e. through static analysis). The SDCs that are considered is:

  • Anti-tampering

  • Root Detection

  • Emulator Detection

  • Dynamic Instrumentation Framework Detection

Follwing tools/software needs to be setup:

  • apktool

  • keytool

  • aapt

  • Android Studio

  • Emulator

  • Java

  • adb (Android debug bridge)

About

This was my research work in which I tried to by-pass the various SDCs recommended by OWASP, especially for the Financial Apps fetched from the Google Play Store.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages