!! THIS TOOL IS FOR EDUCATIONAL PURPOSE !!
A tool that helps bypass Root and Emulator Detection in Android Application. AndRoPass repackage an APK file and bypass Root and Emulator Detection mechanism. The output Apk file is signed and zip alignined.
Install AndRoPass like below:
git clone https://github.com/hojatsajadinia/AndRoPass.git
pip install -r requirements.txt
python AndRoPass.py -h
Use AndRoPass like below:
python AndRoPass.py -a [APK_FILE.apk]
You can build your own Docker image like below:
docker build . -t AndRoPass
Run the Docker version of AndRoPass:
docker run -it -v [APK_DIR_PATH]:/data hojatsajadinia/andropass:latest -a /data/APK_NAME.APK
AndRoPass can fully bypass RootBeer detection mechanism like below:
There is no major difference between WR and WOR; the distinction lies in the decompilation techniques used. You can test either WR or WOR to see which one works best for you.
Important Notice:
The AndRoPass tool is designed to assist with bypassing root detection mechanisms in Android applications for legitimate purposes such as testing and development. However, it is crucial to emphasize the following:
Ethical Use: Ensure that you have the appropriate permissions and rights before using this tool. Unauthorized use of this tool to bypass security mechanisms in applications you do not own or have explicit permission to test is unethical and may be illegal.
Responsibility: The developers of AndRoPass are not responsible for any illegal activities or misuse of the tool. It is your responsibility to use this tool in compliance with all applicable laws and regulations.
Legitimate Purposes Only: This tool should only be used for legitimate purposes, such as security research, educational objectives, or testing within a controlled and authorized environment.
By using AndRoPass, you acknowledge and agree to these terms and take full responsibility for your actions. Always use tools like this responsibly and with respect for the rights and privacy of others.