Quantcast
Channel: Android Tools – Security List Network™
Viewing all articles
Browse latest Browse all 98

Lobotomy – Android reverse engineering tool.

$
0
0

Lobotomy is a command line based Android reverse engineering tool.
Feature:
+ Components: Enumerate AndroidManifest.xml components
+ Permission: Enumerate declared and used AndroidManifest.xml permissions
+ Strings: List and search for strings within the target application
+ AttackSurface: Enumerate the target Application’s attack surface through parsing the AndroidManifest.xml
+ Surgical: Find specific Android API usage throughout the application
+ Interact: Drop into an IPython session to analyze the target application in a more granular fashion
+ Decompile: Decompile the target application with Apktool
+ Debuggable: Convert the target application into being debuggable when installed on a device
+ Dextra: Wrapper around dextra for dumping odex and oat files
+ Socket: Find local and listening sockets on a target Android device

lobotomy

Dependencies:
+ Python 2.7.x
+ virtualenv

Usage and download from source:

git clone https://github.com/rotlogix/lobotomy && cd lobotomy

Install virtualenv :
sudo pip2 install virtualenv
virtualenv -p /usr/bin/python2.7 lobotomy
source lobotomy/bin/activate

pip install -r requirements
cd core/include/androguard
python setup.py install

python lobotomy.py

deactivate

Source: https://github.com/rotlogix


Viewing all articles
Browse latest Browse all 98

Trending Articles