Hello dear community,
I'm currently working on a high-priority project that involves bypassing advanced detection mechanisms in a security-sensitive Android application. I'm in search of a highly experienced Android developer / reverse engineer who is comfortable working at the ROM/system level, understands detection vectors deeply, and can deliver robust, stealthy solutions for multi-accounting use cases.
This is not a beginner-friendly project. If you're just experimenting with public Magisk/KernelSU modules, prebuilt tweaks, or LSPosed scripts from GitHub – this job is not for you.
I'm only looking for individuals who:
Have extensive experience with Android internals, SELinux policies, system services, and modifying AOSP or OEM-based ROMs.
Are fluent in reverse engineering techniques (e.g., smali, JNI/native libs, obfuscation, Frida bypassing, custom hooks).
Know how to detect and defeat root-detection, emulator-detection, injection-detection, and app integrity checks at multiple layers.
Understand SSL pinning bypass techniques beyond standard user-space cert pinning (e.g., TrustManager hooks, system-level trust store injection, native lib patching).
Can implement clean, undetectable solutions that survive reboots, app updates, and avoid triggering automated ban systems.
Bypassing multi-layer root detection
Spoofing various device/system properties at the ROM level, such as fingerprint, serial, build tags, bootloader status, etc.
Bypassing SSL pinning and other networking security mechanisms (CERT pinning, ATS-style protection, etc.).
Ensuring stealth and persistence against updates, anti-cheat engines, and runtime detection.
Deep understanding of Android Security (SELinux, dm-verity, SafetyNet/Play Integrity, system APIs).
Comfort working with AOSP, decompiling and modifying Android ROMs, building custom system images.
Experience with Frida, Xposed/LSPosed/Zygisk, and creating custom native modules (C++/JNI).
Prior work with anti-reverse engineering, stealth injections, app virtualization, or sandboxing is a huge plus.
Ability to work with obfuscated codebases and patch native libraries (libc, libssl, libart).
Starting at $1,000+, depending on experience and the depth of the solution.
Open to ongoing collaboration or long-term retainership if the fit is right.
Paid milestones or proof-of-concept deliverables negotiable.
Contact me on Telegram: "@Pedro860"