[HIRING] Advanced Android Developer / Reverse Engineer – ROM-Level – $1,000+ Budget
寻求有经验的Android开发者/逆向工程师合作,专注于绕过高级检测机制和多账号使用场景。要求熟悉Android底层、SELinux策略、系统服务、AOSP/OEM ROM修改及逆向工程技术。需具备绕过根检测、SSL pinning等安全机制的能力,并能提供持久且隐蔽的解决方案。 2025-7-10 22:43:27 Author: www.reddit.com(查看原文) 阅读量:13 收藏

Hello dear community,

I'm currently working on a high-priority project that involves bypassing advanced detection mechanisms in a security-sensitive Android application. I'm in search of a highly experienced Android developer / reverse engineer who is comfortable working at the ROM/system level, understands detection vectors deeply, and can deliver robust, stealthy solutions for multi-accounting use cases.

This is not a beginner-friendly project. If you're just experimenting with public Magisk/KernelSU modules, prebuilt tweaks, or LSPosed scripts from GitHub – this job is not for you.

I'm only looking for individuals who:

  • Have extensive experience with Android internals, SELinux policies, system services, and modifying AOSP or OEM-based ROMs.

  • Are fluent in reverse engineering techniques (e.g., smali, JNI/native libs, obfuscation, Frida bypassing, custom hooks).

  • Know how to detect and defeat root-detection, emulator-detection, injection-detection, and app integrity checks at multiple layers.

  • Understand SSL pinning bypass techniques beyond standard user-space cert pinning (e.g., TrustManager hooks, system-level trust store injection, native lib patching).

  • Can implement clean, undetectable solutions that survive reboots, app updates, and avoid triggering automated ban systems.

  • Bypassing multi-layer root detection

  • Spoofing various device/system properties at the ROM level, such as fingerprint, serial, build tags, bootloader status, etc.

  • Bypassing SSL pinning and other networking security mechanisms (CERT pinning, ATS-style protection, etc.).

  • Ensuring stealth and persistence against updates, anti-cheat engines, and runtime detection.

  • Deep understanding of Android Security (SELinux, dm-verity, SafetyNet/Play Integrity, system APIs).

  • Comfort working with AOSP, decompiling and modifying Android ROMs, building custom system images.

  • Experience with Frida, Xposed/LSPosed/Zygisk, and creating custom native modules (C++/JNI).

  • Prior work with anti-reverse engineering, stealth injections, app virtualization, or sandboxing is a huge plus.

  • Ability to work with obfuscated codebases and patch native libraries (libc, libssl, libart).

  • Starting at $1,000+, depending on experience and the depth of the solution.

  • Open to ongoing collaboration or long-term retainership if the fit is right.

  • Paid milestones or proof-of-concept deliverables negotiable.

Contact me on Telegram: "@Pedro860"


文章来源: https://www.reddit.com/r/HowToHack/comments/1lwqlbc/hiring_advanced_android_developer_reverse/
如有侵权请联系:admin#unsafe.sh