Android : Evading Android Antivirus

September 10, 2024

When it comes to evading Google Play Protection, modifying the source code of your payload can be an effective solution. Below are the steps to achieve this:

Steps to Modify Payload Source Code

  1. Decompile Your Payload Use apktool to decompile your payload and gain access to its source code.

  2. Access Smali Files from Another APK

    • Find any APK and decompile it to access its smali files.
    • Copy relevant files from the smali folder of the decompiled APK.
    • Paste them into the smali folder of your payload.
  3. Customize the AndroidManifest File Remove any unnecessary permissions from the AndroidManifest.xml file of your payload.

  4. Recompile Your Payload After making the necessary changes, recompile your payload to ensure it can bypass Google Play Protection undetected.

By following these steps, you can professionally and effectively modify your payload’s source code to achieve your desired results.

Pro Tip: Use obfuscated payloads for better results.

Learn More About Obfuscated Android Payloads

Check out this story to create obfuscated Android payloads:

Android Hacking I: Creating Obfuscated Payloads