Android Security

Pen Andro – An Automated Android Penetration Testing Tool

Introduction

Pen-Andro Script will automate the process of installing all necessary tools & tasks for Android Pentesting i.e Moving Burpsuite Certificate,Installing Adb frida server, APKs like proxy toggle, proxydroid, adbwifi.

Usage

  1. Open Terminal
  2. Run below command
curl -sL https://tinyurl.com/pen-Android | sudo bash 

Preconditions

  • Burpsuite proxy Running at 127.0.0.1:8080
  • Rooted Android device connected via adb (Only one device should be connected)
  • Magisk App (It will make installation easy )
  1. For Android Virtual device – GitHub
  2. For Genymotion emulator Blog Link

I want to Install :-

curl -sL https://tinyurl.com/pen-Android | sudo bash

Pen andro

    Pen Andro Demo

    Pen Andro Features

    Android Apps

    • Proxy droid
    • ADB wifi
    • Proxy Toggle

    Pc Tools

    • Frida, objection & Frida-Server for Android
    • jDax-gui
    • scrcpy
    • Burpsuite Certificate install

    Pen Andro FAQs :

    • Burpsuite Error :- Check Proxy tab of Burpsuite at set the proxy as 127.0.0.1 with port 8080
    • Root access Error :- Check If your device is Rooted or not (If not confirmed check
    • Traffic not intercepting :- Reboot the device after Certificate installtion
    • One or more devices conncted :- check with adb devices or try adb kill-server(to remove offline devices)

    Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book

    p r

    Recent Posts

    How to Install Docker on Ubuntu (Step-by-Step Guide)

    Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…

    5 days ago

    Uninstall Docker on Ubuntu

    Docker is one of the most widely used containerization platforms. But there may come a…

    5 days ago

    Admin Panel Dorks : A Complete List of Google Dorks

    Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

    6 days ago

    Log Analysis Fundamentals

    Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

    7 days ago

    Networking Devices 101: Understanding Routers, Switches, Hubs, and More

    What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

    1 week ago

    Sock Puppets in OSINT: How to Build and Use Research Accounts

    Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

    1 week ago