This desktop tool provides a user-friendly interface to scan your Android device for a predefined list of potentially suspicious applications and helps you manage them using Android Debug Bridge (ADB).
- ADB Connection Check: Verifies if your Android device is properly connected and authorized for ADB debugging.
- Application Scanning: Scans all installed packages on your device against an internal list of suspicious app IDs.
- Detailed App Info: Displays the package name and a brief reason for flagging an app.
- Safe Actions:
- Create Backup: Allows you to create a backup (.ab file) of an application's data and APK on your computer before removal.
- Disable App: Safely disables an app, hiding it from your device without uninstalling, which is useful for potentially problematic system apps.
- Uninstall App: Permanently uninstalls selected applications from your device.
- User-Friendly Interface: Built with PyQt5 for an intuitive desktop experience.
PLEASE READ CAREFULLY BEFORE USE.
The list of "suspicious" applications (SUSPICIOUS_PACKAGES
) included in this tool is STATIC and for DEMONSTRATION/EDUCATIONAL PURPOSES ONLY. It is NOT based on real-time threat intelligence and contains many legitimate applications (e.g., Google, McDonald's, TikTok, etc.).
- VERIFY FIRST: Always thoroughly research any application flagged by this tool before taking any action (backup, disable, or uninstall). A legitimate app might be included in the demo list, or a malicious app might be disguised as a legitimate one.
- SYSTEM APPS: DO NOT UNINSTALL SYSTEM APPS unless you are absolutely certain of their function and potential impact. Removing crucial system components can render your device unstable or even unbootable.
- USE AT YOUR OWN RISK: The developer of this tool (
Yogesh Joshi
) is not responsible for any data loss, device damage, or other issues that may arise from the use or misuse of this software. By using this tool, you acknowledge and accept these risks.
Before running the scanner, ensure you have the following:
- Python 3.x: Download from python.org.
- PyQt5: Install via pip:
pip install PyQt5
- ADB (Android Debug Bridge):
- Download: Get the Android SDK Platform-Tools (which includes ADB) from the official Android Developers website.
- Add to PATH: Extract the downloaded archive and add the
platform-tools
directory to your system'sPATH
environment variable. This allows you to runadb
commands from any terminal.
- USB Debugging Enabled on your Android Device:
- Go to Settings > About Phone and tap on "Build Number" seven times to enable Developer Options.
- Then, go to Settings > System > Developer Options (or similar path depending on your device) and enable "USB Debugging".
- When connecting your device, accept any "Allow USB debugging?" prompts that appear on your phone screen.
- Clone the Repository:
git clone [https://github.com/YogeshJoshi001/Android-Device-Scanner.git](https://github.com/YogeshJoshi001/Android-Device-Scanner.git) # Replace with your actual repo URL
- Navigate to the Project Directory:
cd Android-Device-Scanner
- Run the Application:
python malware.py
If you prefer not to set up a Python environment:
- Download the Latest Executable: Go to the Releases page (link will be live after your first release) and download the
AndroidDeviceScanner.exe
file from the latest release. - Ensure ADB is Set Up: Make sure ADB (Android Debug Bridge) is installed and its directory is added to your system's
PATH
(as described in Prerequisites). The executable relies on ADB being accessible. - Run the Executable: Simply double-click
AndroidDeviceScanner.exe
.
This project uses PyInstaller to create a standalone executable for Windows.
- Install PyInstaller:
pip install pyinstaller
- Generate Spec File: Navigate to the project root (
Android-Device-Scanner
) and run:This command creates anpyinstaller --name "AndroidDeviceScanner" --onefile --windowed --icon="icon.ico" malware.py
AndroidDeviceScanner.spec
file andbuild
/dist
directories.--name
: Sets the name of the executable.--onefile
: Packages everything into a single.exe
.--windowed
(--noconsole
): Prevents a console window from opening.--icon
: Specifies your application's icon.
- Build the Executable:
The
pyinstaller AndroidDeviceScanner.spec
AndroidDeviceScanner.exe
will be located in thedist
folder.
- "QThread: Destroyed while thread is still running" on exit: This warning indicates background threads were still active when the application closed. This has been addressed for graceful shutdown in the latest code.
- "ADB not found" / "Command not found": Ensure ADB is correctly installed and its
platform-tools
directory is added to your system'sPATH
environment variable. Restart your terminal or computer after setting PATH. - "Device unauthorized": Check your Android device's screen. A dialog box should appear asking you to "Allow USB debugging?". Tap "Always allow from this computer" and then "OK".
- "No Android device found":
- Verify USB Debugging is enabled on your device.
- Check your USB cable.
- Ensure your device drivers are installed on your computer.
- Try different USB ports.
- Restart your ADB server:
adb kill-server
thenadb start-server
.
- Application crashes after executable build: Check the console output if you build without
--windowed
for more detailed errors. Sometimes, specific hidden imports (PyQt5.Qt
,PyQt5.sip
) might be needed in the.spec
file underhiddenimports=[]
.
Contributions, issues, and feature requests are welcome! Feel free to check the issues page.
This project is licensed under the MIT License - see the LICENSE file for details.
Yogesh Joshi (SoftwareCrackGuru)