Skip to content

Softwareguru123/Android-Device-Scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

Android Device Scanner


Scan and Manage Suspicious Apps on Your Android Device via ADB

This desktop tool provides a user-friendly interface to scan your Android device for a predefined list of potentially suspicious applications and helps you manage them using Android Debug Bridge (ADB).


Features

  • ADB Connection Check: Verifies if your Android device is properly connected and authorized for ADB debugging.
  • Application Scanning: Scans all installed packages on your device against an internal list of suspicious app IDs.
  • Detailed App Info: Displays the package name and a brief reason for flagging an app.
  • Safe Actions:
    • Create Backup: Allows you to create a backup (.ab file) of an application's data and APK on your computer before removal.
    • Disable App: Safely disables an app, hiding it from your device without uninstalling, which is useful for potentially problematic system apps.
    • Uninstall App: Permanently uninstalls selected applications from your device.
  • User-Friendly Interface: Built with PyQt5 for an intuitive desktop experience.

⚠️ CRITICAL SECURITY & ETHICAL DISCLAIMER ⚠️

PLEASE READ CAREFULLY BEFORE USE.

The list of "suspicious" applications (SUSPICIOUS_PACKAGES) included in this tool is STATIC and for DEMONSTRATION/EDUCATIONAL PURPOSES ONLY. It is NOT based on real-time threat intelligence and contains many legitimate applications (e.g., Google, McDonald's, TikTok, etc.).

  • VERIFY FIRST: Always thoroughly research any application flagged by this tool before taking any action (backup, disable, or uninstall). A legitimate app might be included in the demo list, or a malicious app might be disguised as a legitimate one.
  • SYSTEM APPS: DO NOT UNINSTALL SYSTEM APPS unless you are absolutely certain of their function and potential impact. Removing crucial system components can render your device unstable or even unbootable.
  • USE AT YOUR OWN RISK: The developer of this tool (Yogesh Joshi) is not responsible for any data loss, device damage, or other issues that may arise from the use or misuse of this software. By using this tool, you acknowledge and accept these risks.

🚀 Getting Started

Prerequisites

Before running the scanner, ensure you have the following:

  1. Python 3.x: Download from python.org.
  2. PyQt5: Install via pip:
    pip install PyQt5
  3. ADB (Android Debug Bridge):
    • Download: Get the Android SDK Platform-Tools (which includes ADB) from the official Android Developers website.
    • Add to PATH: Extract the downloaded archive and add the platform-tools directory to your system's PATH environment variable. This allows you to run adb commands from any terminal.
  4. USB Debugging Enabled on your Android Device:
    • Go to Settings > About Phone and tap on "Build Number" seven times to enable Developer Options.
    • Then, go to Settings > System > Developer Options (or similar path depending on your device) and enable "USB Debugging".
    • When connecting your device, accept any "Allow USB debugging?" prompts that appear on your phone screen.

How to Use (Source Code)

  1. Clone the Repository:
    git clone [https://github.com/YogeshJoshi001/Android-Device-Scanner.git](https://github.com/YogeshJoshi001/Android-Device-Scanner.git) # Replace with your actual repo URL
  2. Navigate to the Project Directory:
    cd Android-Device-Scanner
  3. Run the Application:
    python malware.py

How to Use (Executable for Windows)

If you prefer not to set up a Python environment:

  1. Download the Latest Executable: Go to the Releases page (link will be live after your first release) and download the AndroidDeviceScanner.exe file from the latest release.
  2. Ensure ADB is Set Up: Make sure ADB (Android Debug Bridge) is installed and its directory is added to your system's PATH (as described in Prerequisites). The executable relies on ADB being accessible.
  3. Run the Executable: Simply double-click AndroidDeviceScanner.exe.

📸 Screenshots / Demo

*image image


🛠️ Building the Executable (for Developers)

This project uses PyInstaller to create a standalone executable for Windows.

  1. Install PyInstaller:
    pip install pyinstaller
  2. Generate Spec File: Navigate to the project root (Android-Device-Scanner) and run:
    pyinstaller --name "AndroidDeviceScanner" --onefile --windowed --icon="icon.ico" malware.py
    This command creates an AndroidDeviceScanner.spec file and build/dist directories.
    • --name: Sets the name of the executable.
    • --onefile: Packages everything into a single .exe.
    • --windowed (--noconsole): Prevents a console window from opening.
    • --icon: Specifies your application's icon.
  3. Build the Executable:
    pyinstaller AndroidDeviceScanner.spec
    The AndroidDeviceScanner.exe will be located in the dist folder.

💡 Troubleshooting Common Issues

  • "QThread: Destroyed while thread is still running" on exit: This warning indicates background threads were still active when the application closed. This has been addressed for graceful shutdown in the latest code.
  • "ADB not found" / "Command not found": Ensure ADB is correctly installed and its platform-tools directory is added to your system's PATH environment variable. Restart your terminal or computer after setting PATH.
  • "Device unauthorized": Check your Android device's screen. A dialog box should appear asking you to "Allow USB debugging?". Tap "Always allow from this computer" and then "OK".
  • "No Android device found":
    • Verify USB Debugging is enabled on your device.
    • Check your USB cable.
    • Ensure your device drivers are installed on your computer.
    • Try different USB ports.
    • Restart your ADB server: adb kill-server then adb start-server.
  • Application crashes after executable build: Check the console output if you build without --windowed for more detailed errors. Sometimes, specific hidden imports (PyQt5.Qt, PyQt5.sip) might be needed in the .spec file under hiddenimports=[].

🤝 Contributing

Contributions, issues, and feature requests are welcome! Feel free to check the issues page.


📄 License

This project is licensed under the MIT License - see the LICENSE file for details.


👨‍💻 Author

Yogesh Joshi (SoftwareCrackGuru)


About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published