Skip to content

ykankaya/android_application_analyzer

 
 

Repository files navigation

Android Application Analyzer

The tool is used to analyze the content of the android application in local storage.

Install the dependency using following command

  • chmod +x setup.sh
  • ./setup.sh

Use the following command to run the tool

  • python3 main.py

Note

In order to run "Fridump" and "Frida universal ssl unpinning" script, Frida client must be installed on base machine

It will list down all the devices connected to the device as shown in Figure: Usage

It will start fetching logcat logs for the selected device as shown in Figure: Usage

In order to analyze the application, select it from dropdown list as shown in Figure: Usage

To analyze the file content of the application, Select the file as shown in Figure: Usage

Analyze the sensitive information logcat logs as shown in Figure: Usage

In order to view application source in JD-GUI, click on "jdgui" button as shown in Figure: Usage

If the mobSF configured in the system and in order to open application with MobSF click on "mobSF" button as shown in Figure: Usage

In order to decompile application using apktool, click on "apktool" button as shown in Figure: Usage

In order to take application sandbox backup for future reference, click on "snapshot" button as shown in Figure: Usage

Frida universal SSL unpinning and fridump support as shown in Figure: Usage

Future Enhancement

  • Strings command on “so or library” file
  • Compatible with python3
  • Deep search :- Find all the files of the application from the entire storage
  • Snapshot button :- Copy entire application directory for future reference
  • The dropdown list of the application instead of Text Box
  • Snapshot button :- Copy entire application directory for future reference
  • The dropdown list of the application instead of Text Box
  • One clikc application decompile using apktool
  • One click JD GUI application navigation
  • Universal Frida SSL Script to bypass ssl pinning
  • Run Fridump tool to check sensitive information in application memory
  • One click reinstall the APK using (uninstall app -> apktool rebuild app -> sign.jar (sign apk)-> install app)
  • One click mobSF analysis (prerequisite: mobSF installation required) Note: as of now update the mobSF endpoint in GlobalVariables.py and "mobSFURL" variable

# References

About

The tool is used to analyze the content of the android application in local storage.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 37.2%
  • Shell 36.7%
  • Batchfile 21.6%
  • JavaScript 4.5%