Releases: worldtreeboy/apkAnalyzer
Releases · worldtreeboy/apkAnalyzer
v1.1.0 — Universal Bypass + Hardened Frida Script
What's New in v1.1.0
🧬 Universal Bypass Script (frida_scripts/universal_bypass.js)
A single all-in-one Frida script that bypasses SSL pinning, root detection, and runtime tampering simultaneously — more comprehensive than any individual CodeShare script.
frida -U -f <package> -l frida_scripts/universal_bypass.js| Layer | What It Bypasses |
|---|---|
| SSL Pinning | TrustManager, TrustManagerFactory, HostnameVerifier, OkHttp3 CertificatePinner (+ proguarded), Conscrypt, TrustKit, WebView SSL, Flutter BoringSSL, Apache HTTP |
| Root Detection | File.exists (30+ paths), PackageManager (20+ root packages), Runtime.exec, ProcessBuilder, Build.TAGS, SystemProperties, RootBeer library, native fopen/access/stat/lstat |
| Runtime Tampering | Anti-Frida (port 27042, /proc/maps, native strstr), anti-debug (ptrace, TracerPid spoofing), System.exit blocking, emulator detection, Xposed detection, process kill prevention |
🔧 Hardened Hooks (v1.1.0 fix)
- Removed dangerous
String.containshook — replaced with targeted nativestrstron libc BufferedReader.readLinenow targeted — only filters lines matching/proc/mapspatterns- Added OkHttp proguarded variant (
check$okhttp) + class scanner - Added native
stat/lstathooks for root path detection - Added
TracerPidspoofing via nativeopen/readhooks - Unique class names (
_uid = Date.now()) prevent collision on script reload
📄 README Redesign
- Terminal demo mockups — see the tool in action without running it
- Collapsible detail sections for cleaner presentation
- Star call-to-action with star-history chart
Full Feature Set
- 11 integrated tools — static analysis, dynamic analysis, Frida instrumentation, binary patching
- 19-check security scan — covers everything MobSF flags
- 38 Frida CodeShare scripts — SSL bypass, root hiding, biometric bypass, crypto/storage monitoring, tracing
- Binary patching — Frida Gadget injection + LSPatch (Xposed) embedding
- Storage audit — SharedPrefs, SQLite, Realm DB with ~40 secret detection regex patterns
- Framework-aware — auto-detects Flutter, React Native, Kotlin, Java
- Zero dependencies — pure Python stdlib
⭐ If this tool saved you time, star the repo — it helps other security researchers discover it!
v1.0.0 — APK Analyzer
APK Analyzer v1.0.0
All-in-one Android security analysis toolkit for penetration testers and security researchers.
Highlights
- 11 integrated tools — static analysis, dynamic analysis, Frida instrumentation, binary patching
- 19-check security scan — debuggable, allowBackup, exported components, permissions, cleartext traffic, data leakage, deeplinks, WebView, PendingIntent, broadcast security, FLAG_SECURE, clipboard exposure, debug logging, keyboard cache, task hijacking, tapjacking, APK signing scheme
- 38 Frida CodeShare scripts — SSL bypass, root hiding, biometric bypass, crypto/storage monitoring, tracing
- Binary patching — Frida Gadget injection + LSPatch (Xposed) embedding
- Storage audit — SharedPrefs, SQLite, Realm DB analysis with secret & PII detection (~40 regex patterns)
- Framework-aware scanning — auto-detects Flutter, React Native, Kotlin, Java and adjusts keyword groups
- Zero dependencies — pure Python stdlib, no pip install needed
Requirements
- Python 3.6+
- ADB + rooted Android device
apktoolfor decompilation- Optional:
frida,apksigner
Usage
python3 apkanalyzer.pyIf this tool helped you, please consider giving it a ⭐!