AndroBugs Android vulnerability Scanner from alaphabanklogs
AndroBugs Android vulnerability scanner from alphabanklogs.
AndroBugs Framework is an Android vulnerability scanner (analysis system) that helps developers or hackers find potential security vulnerabilities in Android applications. No need to install on Windows. No splendid GUI interface, but the most efficient (less than 2 minutes per scan in average) and more accurate.
Version: 1.0.0
####Features:####
Find security vulnerabilities in an Android app
Check if the code is missing best practices
Check dangerous shell commands (e.g. “su”)
Collect Information from millions of apps
Check the app’s security protection (marked as <Hacker>, designed for app repackaging hacking)
##Author
Yu-Cheng Lin (androbugs.framework at gmail.com, @AndroBugs)
Setup Steps and Usage for WindowsEasy to use for Android developers or hackers on Microsoft Windows: (a) No need to install Python 2.7 (b) No need to install any 3rd-party library (c) No need to install AndroBugs Framework
mkdir C:\AndroBugs_Framework
cd C:\AndroBugs_Framework
Unzip the latest Windows version of AndroBugs Framework from Windows releases
Go to Computer->System Properties->Advanced->Environment Variables. Add “C:\AndroBugs_Framework” to the “Path” variable
androbugs.exe -h
Find security vulnerabilities in an Android app
Check if the code is missing best practices
Check dangerous shell commands (e.g. “su”)
Collect Information from millions of apps
Check the app’s security protection (marked as <Hacker>, designed for app repackaging hacking)
##Author
Yu-Cheng Lin (androbugs.framework at gmail.com, @AndroBugs)
Setup Steps and Usage for WindowsEasy to use for Android developers or hackers on Microsoft Windows: (a) No need to install Python 2.7 (b) No need to install any 3rd-party library (c) No need to install AndroBugs Framework
mkdir C:\AndroBugs_Framework
cd C:\AndroBugs_Framework
Unzip the latest Windows version of AndroBugs Framework from Windows releases
Go to Computer->System Properties->Advanced->Environment Variables. Add “C:\AndroBugs_Framework” to the “Path” variable
androbugs.exe -h
androbugs.exe -f [APK file]
Massive Analysis Tool Setup Steps and Usage for Windows
Complete the Setup Steps and Usage for Windows first
Install the Windows version of MongoDB (https://www.mongodb.org/downloads)
Install PyMongo library
Config your own MongoDB settings: C:\AndroBugs_Framework\androbugs-db.cfg
Choose your preferred MongoDB management tool (http://mongodb-tools.com/)
AndroBugs_MassiveAnalysis.exe -h
Example: AndroBugs_MassiveAnalysis.exe -b 20151112 -t BlackHat -d .\All_Your_Apps\ -o .\Massive_Analysis_Reports
AndroBugs_ReportByVectorKey.exe -h
Example: AndroBugs_ReportByVectorKey.exe -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat
Usage for Unix/Linux####To run the AndroBugs Framework:####
python androbugs.py -f [APK file]####To check the usage:####
python androbugs.py -h
Complete the Setup Steps and Usage for Windows first
Install the Windows version of MongoDB (https://www.mongodb.org/downloads)
Install PyMongo library
Config your own MongoDB settings: C:\AndroBugs_Framework\androbugs-db.cfg
Choose your preferred MongoDB management tool (http://mongodb-tools.com/)
AndroBugs_MassiveAnalysis.exe -h
Example: AndroBugs_MassiveAnalysis.exe -b 20151112 -t BlackHat -d .\All_Your_Apps\ -o .\Massive_Analysis_Reports
AndroBugs_ReportByVectorKey.exe -h
Example: AndroBugs_ReportByVectorKey.exe -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat
Usage for Unix/Linux####To run the AndroBugs Framework:####
python androbugs.py -f [APK file]####To check the usage:####
python androbugs.py -h
Usage of Massive Analysis Tools for Unix/Linux
Prerequisite: Setup MongoDB and config your own MongoDB settings in “androbugs-db.cfg”
####To run the massive analysis for AndroBugs Framework:####
python AndroBugs_MassiveAnalysis.py -b [Your_Analysis_Number] -t [Your_Analysis_Tag] -d [APKs input directory] -o [Report output directory]
####To run the massive analysis for AndroBugs Framework:####
python AndroBugs_MassiveAnalysis.py -b [Your_Analysis_Number] -t [Your_Analysis_Tag] -d [APKs input directory] -o [Report output directory]
Example:
python AndroBugs_MassiveAnalysis.py -b 20151112 -t BlackHat -d ~/All_Your_Apps/ -o ~/Massive_Analysis_Reports
####To get the summary report and all the vectors of massive analysis:####
python AndroBugs_ReportSummary.py -m massive -b [Your_Analysis_Number] -t [Your_Analysis_Tag]
Example:
python AndroBugs_ReportSummary.py -m massive -b 20151112 -t BlackHat
To list the potentially vulnerable apps by Vector ID and Severity Level (Log Level):####
python AndroBugs_ReportByVectorKey.py -v [Vector ID] -l [Log Level] -b [Your_Analysis_Number] -t [Your_Analysis_Tag]
python AndroBugs_ReportByVectorKey.py -v [Vector ID] -l [Log Level] -b [Your_Analysis_Number] -t [Your_Analysis_Tag] -a
You can also buy instant:
Cashapp Money Transfer Click here
Paypal Money Transfer Click here
Western Union Money Transfer Click here
Venmo Money Transfer Click here
Bank Money Transfer Click here to Contact Us