LockKnife : The Ultimate Android Security Research Tool - Your Gateway to Android Security Research! ποΈ Dive deep into Android security with this powerful command-line tool designed for researchers. Recover lock screen passwords, Crack lock screen Passwords / Pins / Patterns, extract sensitive data like SMS, Call Logs and Wi-Fi credentials, assess device security, perform network traffic analysis, create file system snapshots for forensic analysis, and more. Connect your device and let LockKnife unlock a world of possibilities! ππ«
- Configuration System: Customize tool behavior via config files in multiple locations or command-line options.
- Gesture Pattern Recognition: Now with precomputed gesture pattern hash mapping and visual representation of lock patterns.
- File System Snapshot: Create comprehensive snapshots of device file systems for offline forensic analysis.
- Network Traffic Analysis: Capture and analyze network traffic with tcpdump to identify security issues.
- Forensic Analysis Tools: Enhanced capabilities for analyzing app data, searching through device snapshots, and extracting sensitive information.
- App-Specific Extraction: Specialized extraction for popular apps:
- WhatsApp: Extract and analyze msgstore.db and contacts
- Telegram: Extract databases and MTProto traces
- Signal: Extract secure messaging data (requires root)
- Browsers: Extract history, cookies, and saved passwords from Chrome/Firefox/Brave/Edge
- Bluetooth Pairing Keys: Extract and analyze Bluetooth pairing keys across different Android versions.
- Keystore Access Monitoring: Monitor and analyze keystore access attempts for security research.
- Gatekeeper HAL Analysis: Advanced credential recovery via Gatekeeper HAL analysis.
- Modern Credential Recovery: Support for extracting and analyzing modern Android credential storage with TEE integration.
- π Password Recovery: Retrieve / Crack lock screen passwords (PIN, pattern, password) effortlessly.
- πΆ Wi-Fi Password Extraction: Easily recover saved Wi-Fi passwords from device.
- π± Multiple Android Versions Supported: Tailored options for different Android versions:
- Android 5 and Older
- Android 6 to 9
- Android 10+ and Newer Versions (Android 14)
- βοΈ Attack Methods:
- Dictionary Attack: Use custom wordlists to recover alphanumeric passwords.
- Brute Force: Try all possible combinations for 4, 6, or 8-digit PINs.
- Parallel Processing: Multi-core support for faster attacks.
- Pattern Recognition: Precomputed gesture pattern hash mapping.
- Gatekeeper Analysis: Extract and analyze modern credential storage.
- π Forensic Analysis:
- File System Snapshot: Capture device file system for offline analysis.
- App Data Analysis: Extract and analyze application data.
- Search Functionality: Find sensitive information in snapshots.
- SQLite Database Extraction: Pull and analyze databases.
- App-Specific Extraction: Specialized tools for popular apps:
- WhatsApp: Extract and analyze msgstore.db and contacts
- Telegram: Extract databases and MTProto traces
- Signal: Extract secure messaging data (requires root)
- Browsers: Extract history, cookies, and saved passwords from Chrome/Firefox/Brave/Edge
- π Network Analysis:
- Traffic Capture: Record network traffic with tcpdump.
- Protocol Analysis: Analyze captured traffic for security issues.
- Unencrypted Traffic Detection: Identify potentially insecure communications.
- π± Device Security:
- Keystore Monitoring: Track keystore access attempts.
- Bluetooth Security: Extract and analyze pairing keys.
- Side-Channel Analysis: Monitor Gatekeeper responses.
- βοΈ Interactive Prompts: User-friendly interface with interactive prompts for seamless recovery.
- π Automatic Device Connection: Uses ADB to automatically connect to device via USB or IP.
- ποΈ Decryption: Decrypts password files and displays recovered passwords.
- π Locksettings Analysis: Analyzes locksettings for lock screen credentials on newer Android versions.
- π Auto Updates: Automatically checks for updates and updates itself to ensure you have the latest version of LockKnife.
- π Security Assessment: Check device's Android version, security patch level, and root status.
- π Custom Data Extraction: Pull and analyze custom files or databases from device.
- π§ͺ Debug Mode: Advanced debugging capabilities for security researchers.
- π Secure File Handling: All sensitive files are handled securely and securely deleted when done.
- βοΈ Customizable Configuration: Configure tool behavior via configuration files or command-line options.
- macOS, Linux, Windows
- Bash-compatible environment
- Android Device with ADB (Android Debug Bridge) enabled
- Android SDK Platform-Tools installed and added to your system's PATH
- sqlite3 required for Android 10+ support and enhanced data extraction features
- GNU Parallel recommended for faster password cracking (optional)
- tshark recommended for network traffic analysis (optional)
To use LockKnife : The Ultimate Android Security Research Tool, follow these steps:
-
Connect your Android device to your computer with USB debugging enabled.
-
Run the following command in your terminal:
bash -c "$(curl -fsSL https://raw.githubusercontent.com/ImKKingshuk/LockKnife/main/LockKnife.sh)"
For advanced debugging and verbose output, use:
bash -c "$(curl -fsSL https://raw.githubusercontent.com/ImKKingshuk/LockKnife/main/LockKnife.sh)" -- --debug
To create a default configuration file:
bash -c "$(curl -fsSL https://raw.githubusercontent.com/ImKKingshuk/LockKnife/main/LockKnife.sh)" -- --create-config=~/.config/lockknife/lockknife.conf
Follow the on-screen prompts to select your device and choose the desired features.
LockKnife looks for configuration files in the following locations (in order):
./lockknife.conf
(current directory)$HOME/.config/lockknife/lockknife.conf
(user config directory)/etc/lockknife.conf
(system-wide config)
You can also specify a custom config file using the --config=FILE
command-line option.
LockKnife : The Ultimate Android Security Research Tool is developed for research and educational purposes. It should be used responsibly and in compliance with all applicable laws and regulations. The developer of this tool is not responsible for any misuse or illegal activities conducted with this tool.
Password recovery tools should only be used for legitimate purposes and with proper authorization. Using such tools without proper authorization is illegal and a violation of privacy. Ensure proper authorization before using LockKnife for password recovery or data extraction. Always adhere to ethical hacking practices and comply with all applicable laws and regulations.
This project is licensed under the GPL-3.0-or-later License.