This is a fork of DroidCat project, original source code can be found here.
DroidCat is a dynamic malware detection and categorization technique using supervised learning algorithms on behavioral characterization of Android apps.
You can find usage information at https://chapering.github.io/droidcat.
Note: This repo is going to be completed. Results are not reproducable yet. I tried to make results reproducable.
- First install Docker.
- Open a terminal and run
./build.sh
to set up the right environment in Docker. - Then run
./run.sh
. This will open a bash shell in your docker container. - Then go to home directory
cd /home
. - Clone this repo:
git clone https://github.com/saba96/droidcat.git
- Then
cd ./droidcat
. - Now run
scripts/cgInstr.sh <Your APK file>
. You can expect to see instrumented apk file under cg.instrumented folder now. If there is no file, an error may have occured so please check out-dynInstr-cg folder to find possible error in instr-.err.
You can find usage information at https://chapering.github.io/droidcat.