Need help with avpass?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

231 Stars 101 Forks GNU General Public License v2.0 78 Commits 7 Opened issues


Tool for leaking and bypassing Android malware detection system

Services available


Need anything else?

Contributors list


AVPASS is a tool for leaking the detection model of Android malware detection systems (i.e., antivirus software), and bypassing their detection logics by using the leaked information coupled with APK obfuscation techniques. AVPASS is not limited to detection features used by detection systems, and can also infer detection rules so that it can disguise any Android malware as a benign application by automatically transforming the APK binary. To prevent leakage of the application logic during transformation, AVPASS provides an Imitation Mode that allows malware developers to safely query curious detection features without sending the entire binary.

AVPASS offers several useful features to transform any Android malware so it can bypass anti-virus software. Below are the main features AVPASS offers:

  • APK obfuscation with more than 10 modules
  • Feature inference for the detection system by using individual obfuscation
  • Rule inference of the detection system by using the 2k factorial experiment
  • Targeted obfuscation to bypass a specific detection system
  • Safe query support by using Imitation Mode


All the code provided on this repository is for educational/research purposes only. Any actions and/or activities related to the material contained within this repository is solely your responsibility. The misuse of the code in this repository can result in criminal charges brought against the persons in question. The authors and SSLab group will not be held responsible in the event any criminal charges be brought against any individuals misusing the code in this repository to break the law. (Disclaimer taken from: here)


  • Bypassing API-, Dataflow-, Interaction-based detection systems


  • Inferring and Bypassing AVs through VirusTotal



This project is released under the GPL license.

Running & Docs

More documentation is available in docs/

Authors and Contact

These are the list of contributors for implementing AVPASS:

  • Jinho Jung
  • Chanil Jeon
  • Max Wolotsky
  • Insu Yun
  • Arbis Arthur Batenburg

Send us email for any questions.

Main contact point: Jinho Jung ([email protected])


If you want to contribute, please pick up something from our Github issues.


  • Black Hat USA 2017
  title        = {{AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically}},
  author       = {Jinho Jung and Chanil Jeon and Max Wolotsky and Insu Yun and Taesoo Kim},
  booktitle    = {Black Hat USA Briefings (Black Hat USA)},
  month        = jul,
  year         = 2017,
  address      = {Las Vegas, NV},

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.