Droid Hunter - Android application vulnerability analysis and Android pentest tool
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEic_Z2iKBquWxpqDGT1HfzHbwgcU8TEiyZWr4ktYJInz3wfAs9MIPy2qiX-Oy7evFFfG393ErvHISncQBUXwvdc44Obi_mgsfbiE_XiBVbnardsgdCq3mSr_yt6qqBCteQPuXrl_2X18vvM/s1600/e8b9b448-545b-11e6-9bb9-ee1cc2f5e28b.png)
Support
- App info check
- Baksmaling android app
- Decompile android app
- Extract class file
- Extract java code
- Pattern base Information Leakage
How to Install?
A. Download(clone) & Unpack DROID-HUNTER
A. Download(clone) & Unpack DROID-HUNTER
git clone https://github.com/hahwul/droid-hunter.git
cd droid-hunter
B. Install Ruby GEM
gem install html-table
gem install colorize
C. Run DROID-HUNTER
ruby dhunter.rb
How to Use?
Usage: ruby dhunter.rb [APK]
Command
-a, --apk : Analysis android APK file.
+ APK Analysis
=> dhunter -a 123.apk[apk file]
=> dhunter --apk 123.apk aaa.apk test.apk hwul.apk
-p, --pentest : Penetration testing Device
+ Pentest Android
=> dhunter -p device[device code]
=> dhunter --pentest device
-v, --version : Show this droid-hunter version
-h, --help : Show help page
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6hntDy7Otf64zs4Kz6d6tUumbb_EDtmHuCSTxzSYzGwwyR8ScuYr7OpplX5ZGtIOs0d5gr6zFt0BNk93ujpaYaX_ErfmG8VsGylrG-CFH7et0DWa1-BQRdooGU3F5ggdaQxkBrcK6f5U_/s1600/cae365d4-5525-11e6-82c8-ccf9d135f3e2.png)
Post a Comment