Lobotomy is a command line based Android reverse engineering tool.
Feature:
+ Components: Enumerate AndroidManifest.xml components
+ Permission: Enumerate declared and used AndroidManifest.xml permissions
+ Strings: List and search for strings within the target application
+ AttackSurface: Enumerate the target Application’s attack surface through parsing the AndroidManifest.xml
+ Surgical: Find specific Android API usage throughout the application
+ Interact: Drop into an IPython session to analyze the target application in a more granular fashion
+ Decompile: Decompile the target application with Apktool
+ Debuggable: Convert the target application into being debuggable when installed on a device
+ Dextra: Wrapper around dextra for dumping odex and oat files
+ Socket: Find local and listening sockets on a target Android device
Dependencies:
+ Python 2.7.x
+ virtualenv
Usage and download from source:
git clone https://github.com/rotlogix/lobotomy && cd lobotomy Install virtualenv : sudo pip2 install virtualenv virtualenv -p /usr/bin/python2.7 lobotomy source lobotomy/bin/activate pip install -r requirements cd core/include/androguard python setup.py install python lobotomy.py deactivate
Source: https://github.com/rotlogix