Wednesday, 28 September 2016

Droid-Hunter - Android Application Vulnerability Analysis And Android Pentest Tool




        .---.        .-----------
/ \ __ / ------
/ / \( )/ ----- ╔╦╗╦═╗╔═╗╦╔╦╗ ╦ ╦╦ ╦╔╗╔╔╦╗╔═╗╦═╗
////// ' \/ ` --- ║║╠╦╝║ ║║ ║║───╠═╣║ ║║║║ ║ ║╣ ╠╦╝
//// / // : : --- ═╩╝╩╚═╚═╝╩═╩╝ ╩ ╩╚═╝╝╚╝ ╩ ╚═╝╩╚═
// / / /` '-- By HaHwul
// //..\\ www.hahwul.com
====UU====UU==== https://github.com/hahwul/droid-hunter
'//||\\`
''``


DROID-HUNTER

1. DROID-HUNTER
Android application vulnerability analysis and Android pentest tool

A. Support
App info check
Baksmaling android app
Decompile android app
Extract class file
Extract java code
Pattern base Information Leakage

2. How to Install?

A. Download(clone) & Unpack DROID-HUNTER
git clone https://github.com/hahwul/droid-hunter.git
cd droid-hunter
B. Install Ruby GEM
gem install html-table
gem install colorize
C. Run DROID-HUNTER
ruby dhunter.rb

3. How to Use?
Usage: ruby dhunter.rb [APK]
Command
-a, --apk : Analysis android APK file.
+ APK Analysis
=> dhunter -a 123.apk[apk file]
=> dhunter --apk 123.apk aaa.apk test.apk hwul.apk
-p, --pentest : Penetration testing Device
+ Pentest Android
=> dhunter -p device[device code]
=> dhunter --pentest device
-v, --version : Show this droid-hunter version
-h, --help : Show help page

4. Support
Contact hahwul@gmail.com

5. Screen shot