Skip to content

Adhrit is an open source Android APK reversing and analysis tool that can help secuity researchers and CTF enthusiasts alike. The tool is an effort to cut down on the amount of time spent on reversing and basic reconnassaince of Android applications.

License

Notifications You must be signed in to change notification settings

loydjayme25/Adhrit

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

1024x512


BUILD STATUS Open Source Love GPL Licence

Adhrit is an open source Android APK reversing and analysis tool that can help security researchers and CTF enthusiasts alike. The tool is an effort to cut down on the amount of time spent on reversing and basic reconnaissance of Android applications. The project is still under progress and will continually incorporate features with time. Feel free to report the issues. Feature requests and suggestions are always welcome!


USES:

  • Extracts the apk contents.
  • Disassembles native libraries
  • Extracts jar out of dex.
  • Extracts source code in Java.
  • Extracts source code in Smali.
  • Recompiles smali into APK
  • Signs the APK
  • Checks for virtual apps/droppers
  • Checks for bytecode injection points and write it to a file.
  • Analyzes permissions used by the application.
  • Dumps the Manifest.
  • Dumps the certificate details.
  • Checks for malware footprints in the VirusTotal database.

PRE-REQUISITES:

  • Linux or MAC
  • Java JDK

USAGE:

  1. Dowload the zip or clone the package and extract the tool ( git clone https://github.com/abhi-r3v0/Adhrit.git ).
  2. Place the application in the tool directory.
  3. Open a terminal and cd into the directory.
  4. Run python installer.py for installing the necessary tools.
  5. Use python adhrit.py -h for usage help.

Example: python adhrit.py -a my_app.apk


SCREENSHOTS:

1

2

3

4

5

6


PRESENTATION:

Cysinfo


BLOG:

bi0s


CONTRIBUTING:

  • Have any cool idea? Here's how you can implement it:
  1. Create a module_name.py and place it in the recons directory.
  2. Define a class with a relevant name and define a function that takesapk_name as a parameter. [eg: my_func(apk_name)]
  3. Open adhrit.py and import the new class from recons. You can look at the already existing imports as an example.
  4. Define a new function inside the class Adhrit in this format: my_new_func(self, apk_name). Call the imported function here. [eg: my_func(apk_name)]
  5. Create a new argument in the argument parser for the new included my_new_func
  6. Call the function with the argument.

Voila! Send us a PR. We'll review it and add it to the project.

THINGS TO REMEMBER:

  • Follow the pep8 conventions.
  • Comment wherever necessary.

THE SQUAD:

PROJECT LEAD:

LEAD CONTRIBUTORS:

GRAPHIC DESIGNS:


MENTIONS:


CREDITS:


NOTE:

  1. Filenames with two '.' may give an error. Please rename the apk in such cases. For example, if your file name is my.app.apk, rename it to myapp.apk

From India, to the world 💙

About

Adhrit is an open source Android APK reversing and analysis tool that can help secuity researchers and CTF enthusiasts alike. The tool is an effort to cut down on the amount of time spent on reversing and basic reconnassaince of Android applications.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 94.0%
  • Shell 6.0%