Android

Pen Andro – An Automated Android Penetration Testing Tool

Introduction

Pen-Andro Script will automate the process of installing all necessary tools & tasks for Android Pentesting i.e Moving Burpsuite Certificate,Installing Adb frida server, APKs like proxy toggle, proxydroid, adbwifi.

Usage

  1. Open Terminal
  2. Run below command
curl -sL https://tinyurl.com/pen-Android | sudo bash 

Preconditions

  • Burpsuite proxy Running at 127.0.0.1:8080
  • Rooted Android device connected via adb (Only one device should be connected)
  • Magisk App (It will make installation easy )
  1. For Android Virtual device – GitHub
  2. For Genymotion emulator Blog Link

I want to Install :-

curl -sL https://tinyurl.com/pen-Android | sudo bash

Pen andro

    Pen Andro Demo

    Pen Andro Features

    Android Apps

    • Proxy droid
    • ADB wifi
    • Proxy Toggle

    Pc Tools

    • Frida, objection & Frida-Server for Android
    • jDax-gui
    • scrcpy
    • Burpsuite Certificate install

    Pen Andro FAQs :

    • Burpsuite Error :- Check Proxy tab of Burpsuite at set the proxy as 127.0.0.1 with port 8080
    • Root access Error :- Check If your device is Rooted or not (If not confirmed check
    • Traffic not intercepting :- Reboot the device after Certificate installtion
    • One or more devices conncted :- check with adb devices or try adb kill-server(to remove offline devices)

    Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book

    p r

    Recent Posts

    JBDev : A Tool For Jailbreak And TrollStore Development

    JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

    13 hours ago

    Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

    The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

    15 hours ago

    Nuclei-Templates-Labs : A Hands-On Security Testing Playground

    Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

    17 hours ago

    SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

    SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

    17 hours ago

    ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

    Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

    17 hours ago

    Cybersecurity – Tools And Their Function

    Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

    2 days ago