drozer
drozer (formerly Mercury) is the leading security testing framework for Android.
drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS.
drozer provides tools to help you use, share and understand public Android exploits. It helps you to deploy a drozer Agent to a device through exploitation or social engineering. Using weasel (MWR's advanced exploitation payload) drozer is able to maximise the permissions available to it by installing a full agent, injecting a limited agent into a running process, or connecting a reverse shell to act as a Remote Access Tool (RAT).
drozer is open source software, maintained by MWR InfoSecurity, and can be downloaded from:
mwr.to/drozer
Building Using Android Studio
- Open Android Studio and launch the Android SDK manager from it (Tools > Android > SDK Manager)
- Check that these two components are installed and updated to the latest version. Install or upgrade
them if necessary.
- Android SDK Platform Tools
- Android Support Library
- Google Play Services
- Google Repository
- Android NDK tools
- Return to Android Studio and select Import Project
- Select the drozer-agent directory
- Select "Import from existing model - Gradle"
IMPORTANT: Once imported make sure the project has been synchronized with the Gradle files.
Build Dependencies
- Java 1.7
- libprotobuf-java 2.6.1 or higher
- protobuf-compiler 2.6 or higher
License
drozer is released under a 3-clause BSD License. See LICENSE for full details.
Contacting the Project
drozer is Open Source software, made great by contributions from the community.
For full source code, to report bugs, suggest features and contribute patches please see our Github project:
https://github.com/mwrlabs/drozer
Bug reports, feature requests, comments and questions can be submitted sent to:
drozer [at] mwrinfosecurity.com
Follow the latest drozer news, follow the project on Twitter:
@mwrdrozer