Skip to content

Releases: worldtreeboy/apkAnalyzer

v1.1.0 — Universal Bypass + Hardened Frida Script

05 Feb 16:34

Choose a tag to compare

What's New in v1.1.0

🧬 Universal Bypass Script (frida_scripts/universal_bypass.js)

A single all-in-one Frida script that bypasses SSL pinning, root detection, and runtime tampering simultaneously — more comprehensive than any individual CodeShare script.

frida -U -f <package> -l frida_scripts/universal_bypass.js
Layer What It Bypasses
SSL Pinning TrustManager, TrustManagerFactory, HostnameVerifier, OkHttp3 CertificatePinner (+ proguarded), Conscrypt, TrustKit, WebView SSL, Flutter BoringSSL, Apache HTTP
Root Detection File.exists (30+ paths), PackageManager (20+ root packages), Runtime.exec, ProcessBuilder, Build.TAGS, SystemProperties, RootBeer library, native fopen/access/stat/lstat
Runtime Tampering Anti-Frida (port 27042, /proc/maps, native strstr), anti-debug (ptrace, TracerPid spoofing), System.exit blocking, emulator detection, Xposed detection, process kill prevention

🔧 Hardened Hooks (v1.1.0 fix)

  • Removed dangerous String.contains hook — replaced with targeted native strstr on libc
  • BufferedReader.readLine now targeted — only filters lines matching /proc/maps patterns
  • Added OkHttp proguarded variant (check$okhttp) + class scanner
  • Added native stat/lstat hooks for root path detection
  • Added TracerPid spoofing via native open/read hooks
  • Unique class names (_uid = Date.now()) prevent collision on script reload

📄 README Redesign

  • Terminal demo mockups — see the tool in action without running it
  • Collapsible detail sections for cleaner presentation
  • Star call-to-action with star-history chart

Full Feature Set

  • 11 integrated tools — static analysis, dynamic analysis, Frida instrumentation, binary patching
  • 19-check security scan — covers everything MobSF flags
  • 38 Frida CodeShare scripts — SSL bypass, root hiding, biometric bypass, crypto/storage monitoring, tracing
  • Binary patching — Frida Gadget injection + LSPatch (Xposed) embedding
  • Storage audit — SharedPrefs, SQLite, Realm DB with ~40 secret detection regex patterns
  • Framework-aware — auto-detects Flutter, React Native, Kotlin, Java
  • Zero dependencies — pure Python stdlib

⭐ If this tool saved you time, star the repo — it helps other security researchers discover it!

v1.0.0 — APK Analyzer

05 Feb 16:14

Choose a tag to compare

APK Analyzer v1.0.0

All-in-one Android security analysis toolkit for penetration testers and security researchers.

Highlights

  • 11 integrated tools — static analysis, dynamic analysis, Frida instrumentation, binary patching
  • 19-check security scan — debuggable, allowBackup, exported components, permissions, cleartext traffic, data leakage, deeplinks, WebView, PendingIntent, broadcast security, FLAG_SECURE, clipboard exposure, debug logging, keyboard cache, task hijacking, tapjacking, APK signing scheme
  • 38 Frida CodeShare scripts — SSL bypass, root hiding, biometric bypass, crypto/storage monitoring, tracing
  • Binary patching — Frida Gadget injection + LSPatch (Xposed) embedding
  • Storage audit — SharedPrefs, SQLite, Realm DB analysis with secret & PII detection (~40 regex patterns)
  • Framework-aware scanning — auto-detects Flutter, React Native, Kotlin, Java and adjusts keyword groups
  • Zero dependencies — pure Python stdlib, no pip install needed

Requirements

  • Python 3.6+
  • ADB + rooted Android device
  • apktool for decompilation
  • Optional: frida, apksigner

Usage

python3 apkanalyzer.py

If this tool helped you, please consider giving it a ⭐!