Skip to content

eekkelund/Needle

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Framework Patcher for Android

What this does

If you have a rooted phone, this will allow you to patch the android system and inject features without needing to recompile the OS or install xposed.

Notably, I made this to inject a fake-signature patch into the system so I can spoof android app signatures.

How to use

Make sure you have adb and java available, connect your device via usb and run python3 patch.py (Note: I have only tested this under Linux)

You will then need to reboot for Android to detect that you've installed a new framework and so for Dalvik/ART to re-optimise all the apps on the phone. Without this, you may receive an INSTALL_FAILED_DEXOPT error when installing new apps.

Note: You will need to redo this everytime you flash a new /system partition (e.g. flashing an updated cyanogenmod zip or new ROM)

How to fake signatures

If you have run patch.py, you should now have a system patched to accept spoofed app signatures. (Useful for microG). This bit below is not necessary if you just want that.

If you want to modify an arbitrary app and keep its signature by making use of this patch, copy the output of:

java /path/to/framework/patcher/ApkSig <apk name>

into a meta-data underneath in the app's AndroidManifest.xml. Disassemble the app as follows:

apktool d <apk name>

Then in AndroidManifest.xml, find the following: (the dots represent other parameters not important for this)

<application ... >

And insert the meta-data

<application ... >
    <meta-data
        android:name="fake-signature"
        android:value="(value obtained from ApkSig earlier)" />

About

Android framework injection made easy

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Java 40.6%
  • Python 36.8%
  • Smali 22.6%