Skip to content

Map-A-Droid/PogoDroid

Repository files navigation

PogoDroid

PogoDroid was an app to provide data of a certain app (let's just call it Pogo) to the self-hosted Python backend called Map-A-Droid by runtime injection into the target process. It offered functionality such as reading nearby monsters and events (raids) by reading the target application's traffic (encoded in Protobuf payloads).

External Dependencies

External dependencies such as libraries were used as part of this project.

Libraries

Compilation

  1. If obfuscation is enabled, copy app/windows_orig.txt to the app dir named windows.txt: cp app/windows_original.txt app/windows.txt
  2. Set home dir of gradle (CI/CD) export GRADLE_USER_HOME=$(pwd)/.gradle
  3. Make gradle executable chmod +x ./gradlew
  4. Compile mock patching binaries cd mock_patch && ./update_libs.sh && cd ..
  5. Compile injection binaries cd injection && ./update_libs.sh && cd ..
  6. Execute gradle with environment variabls set for setting versions ./gradlew assembleRelease -Prelease=true -Pversion_id_patch=${VERSION_ID_PATCH} -Pversion_id_minor=${VERSION_ID_MINOR} --stacktrace

About

Dump of the code of PogoDroid

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published