A comprehensive collection of tools for Android security research, penetration testing, and vulnerability analysis. Designed for educational purposes and authorized security testing only.
This toolkit provides security researchers, penetration testers, and developers with essential tools for:
- Android application security assessment
- APK reverse engineering and analysis
- Dynamic runtime analysis with Frida
- Network security testing
- Vulnerability detection and reporting
IMPORTANT: These tools are provided for educational and authorized testing purposes only!
- β Use only on devices and applications you own or have explicit permission to test
- β Follow responsible disclosure practices for any vulnerabilities found
- β Respect privacy and data protection laws
- β Never use for unauthorized access or malicious activities
- β Do not violate any terms of service or laws
- Linux/Ubuntu (tested on Ubuntu 24.04)
- Minimum 8GB RAM (16GB recommended)
- 20GB free disk space
- x86_64 processor with virtualization support (Intel VT-x or AMD-V)
- Java JDK 17 or higher
- Python 3.8+
- Android SDK
- ADB (Android Debug Bridge)
git clone https://github.com/JavierCollipal/android-security-toolkit.git
cd android-security-toolkit# Copy environment template
cp .env.example .env
# Edit .env with your configuration
nano .env
# Make scripts executable
chmod +x tools/*.sh# Run the setup script
./setup/install-android-sdk.sh# Check virtualization support
egrep -c '(vmx|svm)' /proc/cpuinfo
# Enable KVM
sudo modprobe kvm
sudo modprobe kvm-intel # or kvm-amd for AMD
# Install KVM packages (optional but recommended)
sudo apt-get install -y qemu-kvm libvirt-daemon-systemInteractive security assessment tool for Android devices.
Features:
- Device security assessment
- Network traffic analysis setup
- App permissions audit
- SSL certificate analysis
- Security properties check
- Memory dump analysis
- Process monitoring
- Automated security report generation
Usage:
./tools/android-security-demo.shComprehensive APK reverse engineering and analysis tool.
Features:
- APK extraction from devices
- Decompilation with jadx and apktool
- Security vulnerability scanning
- Hardcoded secrets detection
- Cryptographic weakness analysis
- Manifest analysis
- Native library inspection
Usage:
./tools/apk-analysis.sh
# Follow the interactive menuRuntime manipulation and hooking framework using Frida.
Features:
- SSL pinning bypass
- Method call tracing
- Cryptographic operations logging
- Root detection bypass
- Interactive hooking sessions
- Custom script support
Usage:
./tools/frida-dynamic-analysis.sh
# Install Frida tools first (option 1)
# Deploy to device (option 2)
# Start hooking (option 5)- Create AVD (Android Virtual Device)
# List available system images
sdkmanager --list
# Download system image
sdkmanager "system-images;android-34;google_apis;x86_64"
# Create AVD
avdmanager create avd -n security_device -k "system-images;android-34;google_apis;x86_64"- Launch Emulator
# Basic launch
emulator -avd security_device
# With proxy for traffic interception
emulator -avd security_device -http-proxy 127.0.0.1:8080# List connected devices
adb devices
# Install APK
adb install app.apk
# Extract APK from device
adb shell pm path com.example.app
adb pull /path/to/app.apk
# Take screenshot
adb exec-out screencap -p > screenshot.png
# Capture network traffic
adb shell tcpdump -i any -w /sdcard/capture.pcap
adb pull /sdcard/capture.pcap
# View logs
adb logcat | grep -i security-
Static Analysis
- Extract APK from device or download
- Decompile with jadx/apktool
- Analyze manifest for permissions
- Search for hardcoded secrets
- Check for security misconfigurations
-
Dynamic Analysis
- Install Frida server on device
- Hook into target application
- Bypass security controls (SSL pinning, root detection)
- Monitor runtime behavior
- Log sensitive operations
-
Network Analysis
- Set up proxy (Burp Suite, OWASP ZAP)
- Configure device to use proxy
- Intercept and analyze traffic
- Test for API vulnerabilities
# Android SDK Path
ANDROID_HOME=$HOME/Android/Sdk
# Java Home
JAVA_HOME=/usr/lib/jvm/java-17-openjdk
# Tool Directories
WORK_DIR=~/android-security-audit
TOOLS_DIR=~/android-security-tools
# Optional: Proxy Configuration
PROXY_HOST=127.0.0.1
PROXY_PORT=8080Contributions are welcome! Please read our Contributing Guidelines before submitting PRs.
- Fork the repository
- Create your feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add some AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
Found a security issue? Please report it responsibly:
- Do not create public issues for security vulnerabilities
- Email security concerns to the maintainer
- Allow reasonable time for fixes before disclosure
- OWASP Mobile Security Testing Guide
- Android Security Documentation
- Frida Documentation
- Android Developers Security
- jadx - Dex to Java decompiler
- apktool - Decode/rebuild APKs
- Frida - Dynamic instrumentation toolkit
- MobSF - Mobile Security Framework
- OWASP Mobile Security Project
- Android Security Team
- Frida Development Team
- Security research community
The authors and contributors of this toolkit are not responsible for any misuse or damage caused by these tools. Use at your own risk and only for authorized testing.
Remember: With great power comes great responsibility. Use these tools ethically and legally!
Created with β€οΈ for the security research community