Android Security

Pen Andro – An Automated Android Penetration Testing Tool

Introduction

Pen-Andro Script will automate the process of installing all necessary tools & tasks for Android Pentesting i.e Moving Burpsuite Certificate,Installing Adb frida server, APKs like proxy toggle, proxydroid, adbwifi.

Usage

  1. Open Terminal
  2. Run below command
curl -sL https://tinyurl.com/pen-Android | sudo bash 

Preconditions

  • Burpsuite proxy Running at 127.0.0.1:8080
  • Rooted Android device connected via adb (Only one device should be connected)
  • Magisk App (It will make installation easy )
  1. For Android Virtual device – GitHub
  2. For Genymotion emulator Blog Link

I want to Install :-

curl -sL https://tinyurl.com/pen-Android | sudo bash

Pen andro

    Pen Andro Demo

    Pen Andro Features

    Android Apps

    • Proxy droid
    • ADB wifi
    • Proxy Toggle

    Pc Tools

    • Frida, objection & Frida-Server for Android
    • jDax-gui
    • scrcpy
    • Burpsuite Certificate install

    Pen Andro FAQs :

    • Burpsuite Error :- Check Proxy tab of Burpsuite at set the proxy as 127.0.0.1 with port 8080
    • Root access Error :- Check If your device is Rooted or not (If not confirmed check
    • Traffic not intercepting :- Reboot the device after Certificate installtion
    • One or more devices conncted :- check with adb devices or try adb kill-server(to remove offline devices)

    Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book

    p r

    Recent Posts

    How UDP Works and Why It Is So Fast

    When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

    5 days ago

    How EDR Killers Bypass Security Tools

    Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

    1 week ago

    AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

    A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

    1 week ago

    How Does a Firewall Work Step by Step

    How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

    1 week ago

    Fake VPN Download Trap Can Steal Your Work Login in Minutes

    People trying to securely connect to work are being tricked into doing the exact opposite.…

    1 week ago

    This Android Bug Can Crack Your Lock Screen in 60 Seconds

    A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

    2 weeks ago