akshay1996 / Adhrit

Adhrit is an open source Android APK reversing and analysis tool that can help secuity researchers and CTF enthusiasts alike. The tool is an effort to cut down on the amount of time spent on reversing and basic reconnassaince of Android applications.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

FROM INDIA, TO THE WORLD đź’™

Logo


BUILD STATUS Open Source Love GPL Licence

Adhrit is an open source Android APK reversing and analysis tool that can help security researchers and CTF enthusiasts alike. The tool is an effort to cut down on the amount of time spent on reversing and basic reconnaissance of Android applications. The project is still under progress and will continually incorporate features with time. Feel free to report the issues. Feature requests and suggestions are always welcome!


USES:

  • Extracts the apk contents.
  • Disassembles native libraries
  • Extracts jar out of dex.
  • Extracts source code in Java.
  • Extracts source code in Smali.
  • Recompiles smali into APK
  • Signs the APK
  • Checks for virtual apps/droppers
  • Checks for bytecode injection points and write it to a file.
  • Analyzes permissions used by the application.
  • Dumps the Manifest.
  • Dumps the certificate details.
  • Checks for malware footprints in the VirusTotal database.

PRE-REQUISITES:

  • Linux or MAC
  • Java JDK

SETUP

  1. Dowload the zip or clone the package and extract the tool ( git clone https://github.com/abhi-r3v0/Adhrit.git ).
  2. Open config and input your VirusTotal API key without any quotes. (Click here to know how to obtain your VT API key)
  3. Open a terminal and cd into the directory.
  4. Run python installer.py for installing the necessary tools.

USAGE:

  1. Place the application (apk file) in the tool directory.
  2. Use python adhrit.py -h for usage help.

Example: python adhrit.py -a my_app.apk


SCREENSHOTS:

1

2

3

4

5

6


PRESENTATION:

Cysinfo Cyber Security Meetup


BLOG:

bi0s


VIDEO:

Bug Bounty Tutorial

Bug Bounty Tutorial


Solving a simple mobile CTF challenge

Solving a simple mobile CTF challenge


THE SQUAD:

PROJECT LEAD:

LEAD CONTRIBUTORS:

GRAPHIC DESIGNS:


MENTIONS:


CREDITS:


NOTE:

  1. Filenames with two '.' may give an error. Please rename the apk in such cases. For example, if your file name is my.app.apk, rename it to myapp.apk

About

Adhrit is an open source Android APK reversing and analysis tool that can help secuity researchers and CTF enthusiasts alike. The tool is an effort to cut down on the amount of time spent on reversing and basic reconnassaince of Android applications.

License:GNU General Public License v3.0


Languages

Language:Python 94.4%Language:Shell 5.6%