Utility APK Spoof & Inspect

Замовник: AI | Опубліковано: 13.04.2026
Бюджет: 750 $

I need to put a privately owned Android utility app through a full security workout. The goal is to rebuild the APK so I can switch on-the-fly between location, device-ID, and network spoofing, then watch every request it makes and pull the raw headers for analysis. Here is what I expect: • A modified APK (or Smali/kotlin patch set) that installs cleanly and opens with the same UI and core features intact. • Toggles or an injected menu that lets me: – Fake GPS coordinates, – Rotate IMEI / Android ID / device model, – Divert through custom proxies or change network fingerprints. • A logging mechanism—Burp Suite, mitmproxy, Frida, or any reliable method—that captures complete request and response headers, even when the traffic is pinned or obfuscated. • Short documentation explaining how to rebuild, sign, and deploy the mod plus where the captured logs are written. I’m testing security only, no permanent bypasses or piracy, so the code should stay as close to stock as possible while still giving me the hooks I need.