Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hahwul/droid-hunter
(deprecated) Android application vulnerability analysis and Android pentest tool
https://github.com/hahwul/droid-hunter
android hacking scanner security vulnerability
Last synced: about 1 month ago
JSON representation
(deprecated) Android application vulnerability analysis and Android pentest tool
- Host: GitHub
- URL: https://github.com/hahwul/droid-hunter
- Owner: hahwul
- License: mit
- Archived: true
- Created: 2016-05-27T08:19:58.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2018-11-06T16:26:50.000Z (about 6 years ago)
- Last Synced: 2024-08-01T16:31:46.601Z (4 months ago)
- Topics: android, hacking, scanner, security, vulnerability
- Language: Ruby
- Homepage:
- Size: 11.3 MB
- Stars: 288
- Watchers: 24
- Forks: 77
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-starz - hahwul/droid-hunter - (deprecated) Android application vulnerability analysis and Android pentest tool (Ruby)
- awesome-mobile-security - Droid Hunter – Android application vulnerability analysis and Android pentest tool
README
[![MIT License](https://img.shields.io/badge/license-MIT-blue.svg)](https://opensource.org/licenses/MIT)
.---. .-----------
/ \ __ / ------
/ / \( )/ ----- ╔╦╗╦═╗╔═╗╦╔╦╗ ╦ ╦╦ ╦╔╗╔╔╦╗╔═╗╦═╗
////// ' \/ ` --- ║║╠╦╝║ ║║ ║║───╠═╣║ ║║║║ ║ ║╣ ╠╦╝
//// / // : : --- ═╩╝╩╚═╚═╝╩═╩╝ ╩ ╩╚═╝╝╚╝ ╩ ╚═╝╩╚═
// / / /` '-- By HaHwul
// //..\\ www.hahwul.com
====UU====UU==== https://github.com/hahwul/droid-hunter
'//||\\`
''``
________________________________________________
# DROID-HUNTER
## 1. DROID-HUNTER
Android application vulnerability analysis and Android pentest tool
A. Support
> App info check
> Baksmaling android app
> Decompile android app
> Extract class file
> Extract java code
> Pattern base Information Leakage## 2. How to Install?
A. Download(clone) & Unpack DROID-HUNTER
> git clone https://github.com/hahwul/droid-hunter.git
> cd droid-hunterB. Install Ruby GEM
> gem install html-table
> gem install colorizeC. Set external tools
> Editing "./config/config.rb"
```
# Tool path
$p_adb = "/usr/bin/adb"
$p_aapt = "/usr/bin/aapt" # Path aapt
# macOS > (https://github.com/hahwul/droid-hunter/issues/12)
$p_dex2jar = File.dirname(__FILE__)+"/../ex_tool/dex2jar-0.0.9.15/dex2jar.sh"
$p_apktool = File.dirname(__FILE__)+"/../ex_tool/apktool/apktool_2.3.1.jar"
$p_jad = File.dirname(__FILE__)+"/../ex_tool/jad/jad"
$p_grep = "/bin/grep"
$p_unzip = "/usr/bin/unzip"
$p_sfilter = File.dirname(__FILE__)+"/../string_filter"
```D. Run DROID-HUNTER
> ruby dhunter.rb## 3. How to Use?
Usage: ruby dhunter.rb [APK]
Command
-a, --apk : Analysis android APK file.
+ APK Analysis
=> dhunter -a 123.apk[apk file]
=> dhunter --apk 123.apk aaa.apk test.apk hwul.apk
-p, --pentest : Penetration testing Device
+ Pentest Android
=> dhunter -p device[device code]
=> dhunter --pentest device
-v, --version : Show this droid-hunter version
-h, --help : Show help page## 4. Support
Bug: Add issue(github)
Contact: [email protected]
## 5. TO-DO List
> Add Vulnerability Scanning module
> Update string pattern
> Intent diagram
## 6. Screen shot