Android

Pen Andro – An Automated Android Penetration Testing Tool

Introduction

Pen-Andro Script will automate the process of installing all necessary tools & tasks for Android Pentesting i.e Moving Burpsuite Certificate,Installing Adb frida server, APKs like proxy toggle, proxydroid, adbwifi.

Usage

  1. Open Terminal
  2. Run below command
curl -sL https://tinyurl.com/pen-Android | sudo bash 

Preconditions

  • Burpsuite proxy Running at 127.0.0.1:8080
  • Rooted Android device connected via adb (Only one device should be connected)
  • Magisk App (It will make installation easy )
  1. For Android Virtual device – GitHub
  2. For Genymotion emulator Blog Link

I want to Install :-

curl -sL https://tinyurl.com/pen-Android | sudo bash

Pen andro

    Pen Andro Demo

    Pen Andro Features

    Android Apps

    • Proxy droid
    • ADB wifi
    • Proxy Toggle

    Pc Tools

    • Frida, objection & Frida-Server for Android
    • jDax-gui
    • scrcpy
    • Burpsuite Certificate install

    Pen Andro FAQs :

    • Burpsuite Error :- Check Proxy tab of Burpsuite at set the proxy as 127.0.0.1 with port 8080
    • Root access Error :- Check If your device is Rooted or not (If not confirmed check
    • Traffic not intercepting :- Reboot the device after Certificate installtion
    • One or more devices conncted :- check with adb devices or try adb kill-server(to remove offline devices)

    Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book

    p r

    Recent Posts

    Bomber : Navigating Security Vulnerabilities In SBOMs

    bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

    3 hours ago

    EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

    Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

    3 hours ago

    Exploit Street – Navigating The New Terrain Of Windows LPEs

    Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

    2 days ago

    ShadowDumper – Advanced Techniques For LSASS Memory Extraction

    Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

    3 days ago

    Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

    shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

    2 weeks ago

    ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

    Extract and execute a PE embedded within a PNG file using an LNK file. The…

    3 weeks ago