GitHub - abhi-r3v0/Adhrit: Adhrit is an open source Android APK reversing and analysis tool that can help secuity researchers and CTF enthusiasts alike. The tool is an effort to cut down on the amount of time spent on reversing and basic reconnassaince of Android applications.
Adhrit is an open source Android APK reversing and analysis tool that can help security researchers and CTF enthusiasts alike. The tool is an effort to cut down on the amount of time spent on reversing and basic reconnaissance of Android applications. The project is still under progress and will continually incorporate features with time. Feel free to report the issues. Feature requests and suggestions are always welcome!
- Extracts the apk contents.
- Disassembles native libraries
- Extracts jar out of dex.
- Extracts source code in Java.
- Extracts source code in Smali.
- Recompiles smali into APK
- Signs the APK
- Checks for bytecode injection points.
- Analyzes permissions used by the application.
- Dumps the Manifest.
- Dumps the certificate details.
- Checks for malware footprints in the VirusTotal database.
- Linux or MAC
- Java JDK
- Dowload the zip or clone the package and extract the tool (
git clone https://github.com/abhi-r3v0/Adhrit.git).
- Place the application in the tool directory.
- Open a terminal and cd into the directory.
python installer.pyfor installing the necessary tools.
python adhrit.py -hfor usage help.
python adhrit.py -a my_app.apk
- Filenames with two '.' may give an error. Please rename the apk in such cases.
For example, if your file name is
my.app.apk, rename it to
- Injecting Metasploit Payloads into Android Applications – Manually
- Droidefense - Advance Android Malware Analysis Framework
- GitHub - vincentcox/StaCoAn: StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
- GitHub - UltimateHackers/Diggy: Extract enpoints from apk files.
- Bypassing Android Anti-Emulation, Part (III)