Android application vulnerability analysis and Android pentest tool
Ruby Shell HTML
Latest commit b83728d Aug 12, 2016 @hahwul v2.0
Permalink
Failed to load latest commit information.
config v2.0 Jul 8, 2016
ex_tool v1.0 May 31, 2016
sample v1.0 May 31, 2016
src v2.0 Jul 26, 2016
template v2.0 Jul 26, 2016
LICENSE v1.0_dev May 30, 2016
README.md Update README.md Jul 28, 2016
dhunter.rb v2.0 Jul 26, 2016
install.sh v2.0 Aug 12, 2016
string_filter 2.0dev Jul 7, 2016

README.md

        .---.        .-----------
       /     \  __  /    ------
      / /     \(  )/    -----     ╔╦╗╦═╗╔═╗╦╔╦╗   ╦ ╦╦ ╦╔╗╔╔╦╗╔═╗╦═╗
     //////   ' \/ `   ---         ║║╠╦╝║ ║║ ║║───╠═╣║ ║║║║ ║ ║╣ ╠╦╝
    //// / // :    : ---          ═╩╝╩╚═╚═╝╩═╩╝   ╩ ╩╚═╝╝╚╝ ╩ ╚═╝╩╚═
   // /   /  /`    '--                         By HaHwul
  //          //..\\                         www.hahwul.com
         ====UU====UU====         https://github.com/hahwul/droid-hunter
             '//||\\`
               ''``

DROID-HUNTER

1. DROID-HUNTER

Android application vulnerability analysis and Android pentest tool


A. Support

App info check
Baksmaling android app
Decompile android app
Extract class file
Extract java code
Pattern base Information Leakage

2. How to Install?

A. Download(clone) & Unpack DROID-HUNTER

git clone https://github.com/hahwul/droid-hunter.git
cd droid-hunter

B. Install Ruby GEM

gem install html-table
gem install colorize

C. Run DROID-HUNTER

ruby dhunter.rb

3. How to Use?

Usage: ruby dhunter.rb [APK]
Command
-a, --apk : Analysis android APK file.
 + APK Analysis
   => dhunter -a 123.apk[apk file]
   => dhunter --apk 123.apk aaa.apk test.apk hwul.apk
-p, --pentest : Penetration testing Device
 + Pentest Android
   => dhunter -p device[device code]
   => dhunter --pentest device
-v, --version : Show this droid-hunter version
-h, --help : Show help page

4. Support

Contact hahwul@gmail.com

5. Screen shot