hojatsajadinia / AndRoPass

Tool to check the strength of Android root and emulator detection
MIT License
66 stars 13 forks source link
android-crack android-security android-security-tools security security-tools

Logo

made-with-python MIT License Python 3.12 Maintenance GitHub last commit Open Source Love svg3

AndRoPass

!! THIS TOOL IS FOR EDUCATIONAL PURPOSE !!

A tool that helps bypass Root and Emulator Detection in Android Application. AndRoPass repackage an APK file and bypass Root and Emulator Detection mechanism. The output Apk file is signed and zip alignined.

Requirements

Install and Run

Install AndRoPass like below:

  git clone https://github.com/hojatsajadinia/AndRoPass.git
  pip install -r requirements.txt
  python AndRoPass.py -h

Example

Use AndRoPass like below:

  python AndRoPass.py -a [APK_FILE.apk]

Build docker

You can build your own Docker image like below:

  docker build . -t AndRoPass

Run via Docker (Recommended)

Run the Docker version of AndRoPass:

  docker run -it -v [APK_DIR_PATH]:/data hojatsajadinia/andropass:latest -a /data/APK_NAME.APK

Screenshots

App Screenshot2

App Screenshot

RootBeer Bypass

AndRoPass can fully bypass RootBeer detection mechanism like below: RootBeerBypass

Difference between WR and WOR:

There is no major difference between WR and WOR; the distinction lies in the decompilation techniques used. You can test either WR or WOR to see which one works best for you.

Disclaimer

Important Notice:

The AndRoPass tool is designed to assist with bypassing root detection mechanisms in Android applications for legitimate purposes such as testing and development. However, it is crucial to emphasize the following:

By using AndRoPass, you acknowledge and agree to these terms and take full responsibility for your actions. Always use tools like this responsibly and with respect for the rights and privacy of others.

License

MIT