Skip to content

πŸ”’ Comprehensive Android security research toolkit for ethical hacking and penetration testing

License

Notifications You must be signed in to change notification settings

JavierCollipal/android-security-toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1 Commit
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ”’ Android Security Toolkit

License: MIT Platform Security

A comprehensive collection of tools for Android security research, penetration testing, and vulnerability analysis. Designed for educational purposes and authorized security testing only.

🎯 Purpose

This toolkit provides security researchers, penetration testers, and developers with essential tools for:

  • Android application security assessment
  • APK reverse engineering and analysis
  • Dynamic runtime analysis with Frida
  • Network security testing
  • Vulnerability detection and reporting

⚠️ Legal & Ethical Notice

IMPORTANT: These tools are provided for educational and authorized testing purposes only!

  • βœ… Use only on devices and applications you own or have explicit permission to test
  • βœ… Follow responsible disclosure practices for any vulnerabilities found
  • βœ… Respect privacy and data protection laws
  • ❌ Never use for unauthorized access or malicious activities
  • ❌ Do not violate any terms of service or laws

πŸ“¦ Prerequisites

System Requirements

  • Linux/Ubuntu (tested on Ubuntu 24.04)
  • Minimum 8GB RAM (16GB recommended)
  • 20GB free disk space
  • x86_64 processor with virtualization support (Intel VT-x or AMD-V)

Required Software

  • Java JDK 17 or higher
  • Python 3.8+
  • Android SDK
  • ADB (Android Debug Bridge)

πŸš€ Quick Start

1. Clone the Repository

git clone https://github.com/JavierCollipal/android-security-toolkit.git
cd android-security-toolkit

2. Set Up Environment

# Copy environment template
cp .env.example .env

# Edit .env with your configuration
nano .env

# Make scripts executable
chmod +x tools/*.sh

3. Install Android SDK

# Run the setup script
./setup/install-android-sdk.sh

4. Enable KVM (for emulator acceleration)

# Check virtualization support
egrep -c '(vmx|svm)' /proc/cpuinfo

# Enable KVM
sudo modprobe kvm
sudo modprobe kvm-intel  # or kvm-amd for AMD

# Install KVM packages (optional but recommended)
sudo apt-get install -y qemu-kvm libvirt-daemon-system

πŸ› οΈ Tools Included

1. Android Security Demo (tools/android-security-demo.sh)

Interactive security assessment tool for Android devices.

Features:

  • Device security assessment
  • Network traffic analysis setup
  • App permissions audit
  • SSL certificate analysis
  • Security properties check
  • Memory dump analysis
  • Process monitoring
  • Automated security report generation

Usage:

./tools/android-security-demo.sh

2. APK Analysis Framework (tools/apk-analysis.sh)

Comprehensive APK reverse engineering and analysis tool.

Features:

  • APK extraction from devices
  • Decompilation with jadx and apktool
  • Security vulnerability scanning
  • Hardcoded secrets detection
  • Cryptographic weakness analysis
  • Manifest analysis
  • Native library inspection

Usage:

./tools/apk-analysis.sh
# Follow the interactive menu

3. Frida Dynamic Analysis (tools/frida-dynamic-analysis.sh)

Runtime manipulation and hooking framework using Frida.

Features:

  • SSL pinning bypass
  • Method call tracing
  • Cryptographic operations logging
  • Root detection bypass
  • Interactive hooking sessions
  • Custom script support

Usage:

./tools/frida-dynamic-analysis.sh
# Install Frida tools first (option 1)
# Deploy to device (option 2)
# Start hooking (option 5)

πŸ“š Documentation

Setting Up Android Emulator

  1. Create AVD (Android Virtual Device)
# List available system images
sdkmanager --list

# Download system image
sdkmanager "system-images;android-34;google_apis;x86_64"

# Create AVD
avdmanager create avd -n security_device -k "system-images;android-34;google_apis;x86_64"
  1. Launch Emulator
# Basic launch
emulator -avd security_device

# With proxy for traffic interception
emulator -avd security_device -http-proxy 127.0.0.1:8080

Common ADB Commands

# List connected devices
adb devices

# Install APK
adb install app.apk

# Extract APK from device
adb shell pm path com.example.app
adb pull /path/to/app.apk

# Take screenshot
adb exec-out screencap -p > screenshot.png

# Capture network traffic
adb shell tcpdump -i any -w /sdcard/capture.pcap
adb pull /sdcard/capture.pcap

# View logs
adb logcat | grep -i security

Security Testing Workflow

  1. Static Analysis

    • Extract APK from device or download
    • Decompile with jadx/apktool
    • Analyze manifest for permissions
    • Search for hardcoded secrets
    • Check for security misconfigurations
  2. Dynamic Analysis

    • Install Frida server on device
    • Hook into target application
    • Bypass security controls (SSL pinning, root detection)
    • Monitor runtime behavior
    • Log sensitive operations
  3. Network Analysis

    • Set up proxy (Burp Suite, OWASP ZAP)
    • Configure device to use proxy
    • Intercept and analyze traffic
    • Test for API vulnerabilities

πŸ”§ Configuration

Environment Variables (.env)

# Android SDK Path
ANDROID_HOME=$HOME/Android/Sdk

# Java Home
JAVA_HOME=/usr/lib/jvm/java-17-openjdk

# Tool Directories
WORK_DIR=~/android-security-audit
TOOLS_DIR=~/android-security-tools

# Optional: Proxy Configuration
PROXY_HOST=127.0.0.1
PROXY_PORT=8080

🀝 Contributing

Contributions are welcome! Please read our Contributing Guidelines before submitting PRs.

  1. Fork the repository
  2. Create your feature branch (git checkout -b feature/AmazingFeature)
  3. Commit your changes (git commit -m 'Add some AmazingFeature')
  4. Push to the branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

πŸ“ License

This project is licensed under the MIT License - see the LICENSE file for details.

πŸ›‘οΈ Security Policy

Found a security issue? Please report it responsibly:

  • Do not create public issues for security vulnerabilities
  • Email security concerns to the maintainer
  • Allow reasonable time for fixes before disclosure

πŸ“– Resources

Learning Materials

Tools & Frameworks

πŸ™ Acknowledgments

  • OWASP Mobile Security Project
  • Android Security Team
  • Frida Development Team
  • Security research community

⚑ Disclaimer

The authors and contributors of this toolkit are not responsible for any misuse or damage caused by these tools. Use at your own risk and only for authorized testing.


Remember: With great power comes great responsibility. Use these tools ethically and legally!

Created with ❀️ for the security research community

About

πŸ”’ Comprehensive Android security research toolkit for ethical hacking and penetration testing

Topics

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages