All Projects → abhi-r3v0 → Adhrit

abhi-r3v0 / Adhrit

Licence: gpl-3.0
Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.

Programming Languages

javascript
184084 projects - #8 most used programming language
java
68154 projects - #9 most used programming language

Projects that are alternatives of or similar to Adhrit

Dexcalibur
[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Stars: ✭ 512 (+28.32%)
Mutual labels:  apk, analysis, dex, security-tools, smali, mobile-security, android-security
Apkleaks
Scanning APK file for URIs, endpoints & secrets.
Stars: ✭ 2,707 (+578.45%)
Mutual labels:  apk, mobile-security, android-security
dalvikgate
Lightweight dex / odex / apk to jar converter
Stars: ✭ 32 (-91.98%)
Mutual labels:  apk, smali, dex
Apk Changer
Command line program for modifying apk files
Stars: ✭ 122 (-69.42%)
Mutual labels:  apk, dex, smali
Mobile Security Framework Mobsf
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (+2459.4%)
Mutual labels:  apk, mobile-security, android-security
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+360.4%)
Mutual labels:  security-tools, mobile-security, android-security
Android Crack Tool
🐞Android crack tool For Mac
Stars: ✭ 2,666 (+568.17%)
Mutual labels:  apk, dex, smali
Fakerandroid
A tool translate a apk file to stantard android project include so hook api and il2cpp c++ scaffolding when apk is a unity il2cpp game. Write code on a apk file elegantly.
Stars: ✭ 695 (+74.19%)
Mutual labels:  apk, dex, smali
Android Classyshark
Android and Java bytecode viewer
Stars: ✭ 6,930 (+1636.84%)
Mutual labels:  apk, analysis, dex
mobileAudit
Django application that performs SAST and Malware Analysis for Android APKs
Stars: ✭ 140 (-64.91%)
Mutual labels:  apk, android-security, mobile-security
Bytecode Viewer
A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
Stars: ✭ 12,606 (+3059.4%)
Mutual labels:  apk, smali
Command Mobile Penetration Testing Cheatsheet
Mobile penetration testing android & iOS command cheatsheet
Stars: ✭ 221 (-44.61%)
Mutual labels:  apk, mobile-security
remote-adb-scan
pure python remote adb scanner + nmap scan module
Stars: ✭ 19 (-95.24%)
Mutual labels:  android-security, mobile-security
Backdoor Apk
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
Stars: ✭ 1,766 (+342.61%)
Mutual labels:  apk, smali
NinjaDroid
Ninja Reverse Engineering on Android APK packages
Stars: ✭ 224 (-43.86%)
Mutual labels:  apk, dex
Fastdex
🚀 加快 apk 的编译速度 🚀
Stars: ✭ 1,457 (+265.16%)
Mutual labels:  apk, dex
dex2jar
Tools to work with android .dex and java .class files
Stars: ✭ 102 (-74.44%)
Mutual labels:  smali, dex
dumproid
Android process memory dump tool without ndk.
Stars: ✭ 55 (-86.22%)
Mutual labels:  android-security, mobile-security
Krane
Kubernetes RBAC static Analysis & visualisation tool
Stars: ✭ 254 (-36.34%)
Mutual labels:  analysis, security-tools
RocketXPlugin
🔥🔥 android 端编译加速插件🚀 自动识别未改动 module 并在编译流程中替换为 aar ,只编译改动模块,加速 Android apk 的编译速度。
Stars: ✭ 408 (+2.26%)
Mutual labels:  apk, dex

Logo

INDIA Open Source Love made-with-python saythanks pep8 version Hits

Adhrit is an open source Android APK reversing and analysis suite. The tool is an effort to find an efficient solution to all the needs of mobile security testing and automation. Adhrit has been built with a focus on flexibility and mudularization. Adhrit currently uses the Ghera benchmarks to identify vulnerability patterns in Android applications. The project is subject to continuous updations and will incorporate the latest available methodologies and tools. Adhrit has been presented at conferences like OWASP Seasides, ThreatCon and Cysinfo. Feature requests and bug reports are always welcome!


Features:

  • Manifest Analysis

    • Package name, debug and backup status
    • Exported components (activities, services, providers and receivers)
    • Deeplinks
    • Implicit intent filters
    • Critical permissions
  • Bytecode Analysis

    • Usage Analysis

      • SQLite DBs
      • SharedPreferences
    • Vulnerability Analysis

      • ICC
      • Web Issues
      • Storage Issues
      • Networking
      • Crypto Issues
  • Secrets Analysis

    • URLs
    • API tokens
    • Strings from native libraries

Screenshots:

1

2

3

4

5


Pre-requisites:

  • Linux or MAC
  • Python3
  • Java JDK

Quick Setup

  1. Dowload the zip or clone the package and extract the tool ( git clone https://github.com/abhi-r3v0/Adhrit.git ).
  2. Run python3 run.py

The script automatically identifies if you're running Adhrit for the first time and will install all the dependencies & libraries required by the tool.


Presentations / Conferences:


Usage:

python3 run.py

This will automatically launch the Web interface where the APK can be uploaded and the report will be generated.

If the UI didn't launch by itself, navigate to http://localhost:4200/


Process

1


Team:

Project Lead:

Core Team:

Lead Contributors:

Logo:


Awesome tools:


Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].