Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Awesome Adb | 8,679 | a year ago | 37 | mit | ||||||
ADB Usage Complete / ADB 用法大全 | ||||||||||
Appmanager | 2,564 | 5 days ago | 128 | other | Java | |||||
A full-featured package manager and viewer for Android | ||||||||||
Developerhelper | 1,209 | 2 months ago | 20 | mit | Kotlin | |||||
📌易开发是一款帮助开发人员快速开发的工具,功能包括界面分析,页面信息,加固脱壳,支持Android9.0 | ||||||||||
Adbsploit | 575 | 19 days ago | 11 | Python | ||||||
A python based tool for exploiting and managing Android devices via ADB | ||||||||||
Wsatools | 496 | 13 days ago | 23 | |||||||
Easy-to-use APK installer and more for Windows Subsystem for Android | ||||||||||
Androidproxysetter | 375 | 3 years ago | 8 | gpl-3.0 | Java | |||||
An android app that sets the proxy settings for a wifi access point by using adb | ||||||||||
Gradle Android Command Plugin | 357 | a year ago | 5 | July 10, 2015 | other | Groovy | ||||
Handy commands for testing Android on CI | ||||||||||
Androidtestscripts | 337 | 3 years ago | 3 | Python | ||||||
Android测试中常用到的脚本 | ||||||||||
Whatsapp Key Database Extractor | 298 | 2 months ago | 4 | April 25, 2021 | 7 | mit | Python | |||
The most advanced and complete solution for extracting WhatsApp key/DB from package directory (/data/data/com.whatsapp) without root access. | ||||||||||
Xadb | 294 | 2 years ago | 2 | mit | Shell | |||||
some useful adb commands for android reversing and debugging both 32 and 64 bit and support macOS and win10's MINGW64. |
Well, the presentation of this tool at the 29C3 event was pretty short and we did not take time to put all the doc here so here is a little HowTo (much more doc to come but hopefully this small README would be enough to cover what has been shown during our presentation).
Clone all the required git repos (fino, gadget and gadget-client) available on Sysdream's Github
Make sure apktool, jarsigner and sed are installed and available in your environment
Make sure fino/inject.sh script is chmod +x
Make sure you have your Android debug keystore available in ~/.android/debug.keystore. If not, create it:
keytool -genkey -v -keystore ~/.android/debug.keystore -alias androiddebugkey -storepass android -keypass android -keyalg RSA -validity 14000
(use any values for the certificate)
Take any APK file, and inject Fino's minimal service using fino/inject.sh script like this:
cd fino
./inject.sh my-original.apk dest-app-with-fino.apk
Install the APK inside an emulator or in your phone using adb or a file manager:
adb install dest-app-with-fino.apk.
If you use adb, no matter if "Accept unknown sources" option is enabled, it will install the app. Check this option if you install it from a file manager.
You have successfully injected Fino's service inside an existing APK and drop the patched version of it into an Android device. Let setup Gadget now.
Compile and install the Gadget application on the Android device (we will provide a clean APK later, for the moment simply use ant to build it and install it). If cxompilation does not work, use the gadget.apk file we dropped in the repo.
Launch Gadget, it will start a background service handling every TCP clients
With adb, forward a local port of your computer to the android device (if you are using a real phone, you're supposed to have it connected via USB):
adb forward tcp:1234 tcp:4444.
You can set the port used by Gadget in its main config screen.
In the gadget-client repo, you'll find a shell.py script. Launch it (give every needed parameters, that is local ip, local port and your apk package name).
Enjoy the shell.
Once done, you can access your target app with some "magic" variables:
To get a reference to an existing class, use app.get_class(). This method is documented (docstring). Once an activity is retrieved, you can access everything in it and change almost everything, as shown in our demo. The only limit is the obfuscation (added by proguard for example) and you should need a quick static analysis first before going deeper inside the running app).
Some useful code snippets when dealing with android applications with Fino:
To get all the running activities of a given application, use this:
activities = app.find('android.app.Activity')
Auto-completion is provided by pressing
Python's dir() method may be useful to explore objects at runtime but may sometimes not help anymore when facing code obfuscation
To refresh a running activity, the Python's Activity class implements a method called refresh() which handles everything
If a property name is also a method name, you must specify if you want to call the method or just get the property by using the corresponding helper: someobject._P.someproperty or someobject._M.somemethod()