Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/hahwul/droid-hunter

(deprecated) Android application vulnerability analysis and Android pentest tool
https://github.com/hahwul/droid-hunter

android hacking scanner security vulnerability

Last synced: about 1 month ago
JSON representation

(deprecated) Android application vulnerability analysis and Android pentest tool

Awesome Lists containing this project

README

        

[![MIT License](https://img.shields.io/badge/license-MIT-blue.svg)](https://opensource.org/licenses/MIT)

.---. .-----------
/ \ __ / ------
/ / \( )/ ----- ╔╦╗╦═╗╔═╗╦╔╦╗ ╦ ╦╦ ╦╔╗╔╔╦╗╔═╗╦═╗
////// ' \/ ` --- ║║╠╦╝║ ║║ ║║───╠═╣║ ║║║║ ║ ║╣ ╠╦╝
//// / // : : --- ═╩╝╩╚═╚═╝╩═╩╝ ╩ ╩╚═╝╝╚╝ ╩ ╚═╝╩╚═
// / / /` '-- By HaHwul
// //..\\ www.hahwul.com
====UU====UU==== https://github.com/hahwul/droid-hunter
'//||\\`
''``
________________________________________________
# DROID-HUNTER
## 1. DROID-HUNTER
Android application vulnerability analysis and Android pentest tool



A. Support

> App info check

> Baksmaling android app

> Decompile android app

> Extract class file

> Extract java code

> Pattern base Information Leakage

## 2. How to Install?
A. Download(clone) & Unpack DROID-HUNTER
> git clone https://github.com/hahwul/droid-hunter.git

> cd droid-hunter

B. Install Ruby GEM

> gem install html-table

> gem install colorize

C. Set external tools
> Editing "./config/config.rb"
```
# Tool path
$p_adb = "/usr/bin/adb"
$p_aapt = "/usr/bin/aapt" # Path aapt
# macOS > (https://github.com/hahwul/droid-hunter/issues/12)
$p_dex2jar = File.dirname(__FILE__)+"/../ex_tool/dex2jar-0.0.9.15/dex2jar.sh"
$p_apktool = File.dirname(__FILE__)+"/../ex_tool/apktool/apktool_2.3.1.jar"
$p_jad = File.dirname(__FILE__)+"/../ex_tool/jad/jad"
$p_grep = "/bin/grep"
$p_unzip = "/usr/bin/unzip"
$p_sfilter = File.dirname(__FILE__)+"/../string_filter"
```

D. Run DROID-HUNTER

> ruby dhunter.rb

## 3. How to Use?

Usage: ruby dhunter.rb [APK]
Command
-a, --apk : Analysis android APK file.
+ APK Analysis
=> dhunter -a 123.apk[apk file]
=> dhunter --apk 123.apk aaa.apk test.apk hwul.apk
-p, --pentest : Penetration testing Device
+ Pentest Android
=> dhunter -p device[device code]
=> dhunter --pentest device
-v, --version : Show this droid-hunter version
-h, --help : Show help page

## 4. Support
Bug: Add issue(github)

Contact: [email protected]


## 5. TO-DO List
> Add Vulnerability Scanning module

> Update string pattern

> Intent diagram



## 6. Screen shot