APKKiller is a method to bypass various android application security system check such as Signature Verification, Integrity Check, etc. APKKiller uses JNI & Reflection to bypass Hidden API Restriction, however there is no guarantee that APKKiller will bypass all android application security. APKKiller is made for educational purpose only, use with discretion.
When an android application is loaded, it stores various information regarding current running Application like App Name, Package Name, Signature, APK Path, etc. You can't access those information normal way, but with Reflection you access, read and write new data to those internal classes & fields.
These informations are stored in a class like AppBindData, LoadedApk, ApplicationInfo, etc.
APKKiller changes data on those classes to spoof current application information such APK Path, APK Signatures, APK Installer Information, etc. APKKiller is not guaranteed to work on all apps/games, but it is guaranteed to bypass majorities of application security system.
APKKiller.h
using the result of APKSignReadercom/kuro
(APKKiller smali) to the Target App smaliAndroidManifest.xml
Start
function on the target app attachBaseContext
(Application) or onCreate
(Activity) [Preferrably attachBaseContext]For example:
attachBaseContext
onCreate
<decompile_target_app_dir>/assets/original.apk