Android Security

Pen Andro – An Automated Android Penetration Testing Tool

Introduction

Pen-Andro Script will automate the process of installing all necessary tools & tasks for Android Pentesting i.e Moving Burpsuite Certificate,Installing Adb frida server, APKs like proxy toggle, proxydroid, adbwifi.

Usage

  1. Open Terminal
  2. Run below command
curl -sL https://tinyurl.com/pen-Android | sudo bash 

Preconditions

  • Burpsuite proxy Running at 127.0.0.1:8080
  • Rooted Android device connected via adb (Only one device should be connected)
  • Magisk App (It will make installation easy )
  1. For Android Virtual device – GitHub
  2. For Genymotion emulator Blog Link

I want to Install :-

curl -sL https://tinyurl.com/pen-Android | sudo bash

Pen andro

    Pen Andro Demo

    Pen Andro Features

    Android Apps

    • Proxy droid
    • ADB wifi
    • Proxy Toggle

    Pc Tools

    • Frida, objection & Frida-Server for Android
    • jDax-gui
    • scrcpy
    • Burpsuite Certificate install

    Pen Andro FAQs :

    • Burpsuite Error :- Check Proxy tab of Burpsuite at set the proxy as 127.0.0.1 with port 8080
    • Root access Error :- Check If your device is Rooted or not (If not confirmed check
    • Traffic not intercepting :- Reboot the device after Certificate installtion
    • One or more devices conncted :- check with adb devices or try adb kill-server(to remove offline devices)

    Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book

    p r

    Recent Posts

    Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

    Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

    1 week ago

    CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

    Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

    1 week ago

    CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

    Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

    1 week ago

    How to Bash Append to File: A Simple Guide for Beginners

    If you are working with Linux or writing bash scripts, one of the most common…

    1 week ago

    Mastering the Bash Case Statement with Simple Examples

    What is a bash case statement? A bash case statement is a way to control…

    1 week ago

    How to Check if a File Exists in Bash – Simply Explained

    Why Do We Check Files in Bash? When writing a Bash script, you often work…

    1 week ago