Android Application Analyzer
The tool is used to analyze the content of the android application in local storage.
Install the dependency using following command
chmod +x setup.sh
./setup.sh
Use the following command to run the tool
python3 main.py
Note
In order to run "Fridump" and "Frida universal ssl unpinning"
script, Frida client must be installed on base machine
It will list down all the devices connected to the device as shown in Figure:
It will start fetching logcat logs for the selected device as shown in Figure:
In order to analyze the application, select it from dropdown list as shown in Figure:
To analyze the file content of the application, Select the file as shown in Figure:
Analyze the sensitive information logcat logs as shown in Figure:
In order to view application source in JD-GUI, click on "jdgui" button as shown in Figure:
If the mobSF configured in the system and in order to open application with MobSF click on "mobSF" button as shown in Figure:
In order to decompile application using apktool, click on "apktool" button as shown in Figure:
In order to take application sandbox backup for future reference, click on "snapshot" button as shown in Figure:
Frida universal SSL unpinning and fridump support as shown in Figure:
Future Enhancement
- Strings command on โso or libraryโ file
- Compatible with python3
- Deep search :- Find all the files of the application from the entire storage
- Snapshot button :- Copy entire application directory for future reference
- The dropdown list of the application instead of Text Box
- Snapshot button :- Copy entire application directory for future reference
- The dropdown list of the application instead of Text Box
- One clikc application decompile using apktool
- One click JD GUI application navigation
- Universal Frida SSL Script to bypass ssl pinning
- Run Fridump tool to check sensitive information in application memory
- One click reinstall the APK using (uninstall app -> apktool rebuild app -> sign.jar (sign apk)-> install app)
- One click mobSF analysis (prerequisite: mobSF installation required) Note: as of now update the mobSF endpoint in GlobalVariables.py and "mobSFURL" variable
# References
- https://stackoverflow.com/questions/11524586/accessing-logcat-from-android-via-python
- https://payatu.com/wp-content/uploads/2016/01/diva-beta.tar.gz
- https://pythonspot.com/pyqt5/
- https://github.com/iBotPeaches/Apktool/releases
- https://github.com/java-decompiler/jd-gui/releases
- https://github.com/pxb1988/dex2jar/releases
- https://github.com/appium/sign/tree/master/dist
- https://github.com/frida/frida/releases/download/12.8.10/frida-server-12.8.10-android-x86.xz
- https://github.com/Nightbringer21/fridump
- https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/