Skip to content
master
Go to file
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

README.md

Logo

INDIA Open Source Love made-with-python saythanks pep8 version Hits

Adhrit is an open source Android APK reversing and analysis suite. The tool is an effort to find an efficient solution to all the needs of mobile security testing and automation. Adhrit has been built with a focus on flexibility and mudularization. Adhrit currently uses the Ghera benchmarks to identify vulnerability patterns in Android applications. The project is subject to continuous updations and will incorporate the latest available methodologies and tools. Adhrit has been presented at conferences like OWASP Seasides, ThreatCon and Cysinfo. Feature requests and bug reports are always welcome!


Features:

  • Manifest Analysis

    • Package name, debug and backup status
    • Exported components (activities, services, providers and receivers)
    • Deeplinks
    • Implicit intent filters
    • Critical permissions
  • Bytecode Analysis

    • Usage Analysis

      • SQLite DBs
      • SharedPreferences
    • Vulnerability Analysis

      • ICC
      • Web Issues
      • Storage Issues
      • Networking
      • Crypto Issues
  • Secrets Analysis

    • URLs
    • API tokens
    • Strings from native libraries

Screenshots:

1

2

3

4

5


Pre-requisites:

  • Linux or MAC
  • Python3
  • Java JDK

Quick Setup

  1. Dowload the zip or clone the package and extract the tool ( git clone https://github.com/abhi-r3v0/Adhrit.git ).
  2. Run python3 run.py

The script automatically identifies if you're running Adhrit for the first time and will install all the dependencies & libraries required by the tool.


Presentations / Conferences:


Usage:

python3 run.py

This will automatically launch the Web interface where the APK can be uploaded and the report will be generated.

If the UI didn't launch by itself, navigate to http://localhost:4200/


Process

1


Team:

Project Lead:

Core Team:

Lead Contributors:

Logo:


Awesome tools:


You can’t perform that action at this time.