A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.
-
Updated
Apr 13, 2024 - Python
A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.
Finding new methods to detect tampering of native functions in JS (chrome V8)
Metadata encoding and extraction for AI-generated content
📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems such as Google Play SafetyNet and Huawei Safety Detect.
[Package Flutter] Flutter Tamper Detector is a security plugin for Flutter that detects and prevents tampering. It identifies if the device is rooted, if hooking tools like Frida, Xposed, or Cydia Substrate are present, or if the device is an emulator. It can automatically close the app to protect integrity and security.
Implementation of a simulated environment using python
Chain of Custody is a tamper-proof forensic evidence system ensuring integrity, traceability, and availability through dual storage (Local + IPFS), fuzzy hashing, and a private blockchain with role-based access control. 4th Place @ CIDECODE 2.0
Forward-secure Go library for tamper-evident audit logs, implementing Ma–Tsudik’s dual-MAC private-verifiable scheme.
InkCrypt is a PDF security platform that combines cryptographic signatures with machine learning to detect tampering. It offers invisible watermarks, real-time verification, and predictive risk analytics. Perfect for FinTech, LegalTech, and Healthcare, with 99.9% tamper detection accuracy.
Forensic computer vision pipeline to inspect medicine strip authenticity using OCR, texture analysis, and tamper detection with OpenCV and EasyOCR.
Tamper Detection system built on ESP32 using LDR, MPU6050, Reed Switch, and Blynk submitted for the Smart India Hackathon 2025.
Enterprise file integrity monitoring system using RSA digital signatures, X.509 certificates, and cryptographic hashing (MD5/SHA-256). Features AES encryption, tamper detection, and audit logging.
Deterministic, tick bound runtime integrity verification that blocks execution under drift or tamper before any sensitive operation.
A blockchain-anchored audit management system that ensures data integrity, detects database and evidence tampering, and provides role-based verification workflows for business users, auditors, and administrators.
BlackVault is a secure communication framework that uses advanced encryption to protect user data. With its unique self-defending protocols, it actively prevents unauthorized access and ensures privacy for users and developers alike. 🛡️🔒
Software supply-chain security domain repository delivering modular components for artifact signing, build attestation, provenance tracking, SBOM generation, policy enforcement, and runtime integrity — designed to enable verifiable, tamper-resistant delivery pipelines.
🔍 Inspect medicine strip authenticity with MedTrace, a forensic computer vision pipeline that detects tampering and ensures accurate drug information.
Cryptographic skill verification for OpenClaw. SHA-256 content hashing and tamper detection for installed skills. Free alert layer.
Secure healthcare data protection system using hybrid RSA–AES encryption, secure email envelope delivery, cryptographic RBAC, audit logging, and tamper detection with GUI support.
A lightweight Flask application to verify file integrity using SHA-256 and detect tampering.
Add a description, image, and links to the tamper-detection topic page so that developers can more easily learn about it.
To associate your repository with the tamper-detection topic, visit your repo's landing page and select "manage topics."