Androwarn is an instrument whose primary point is to identify and caution the client about potential pernicious practices developped by an Android application.
The identification is performed with the static examination of the application's Dalvik bytecode, spoke to as Smali, with the androguard library.
This investigation prompts the age of a report, as indicated by a specialized detail level browsed the client.
Demo

How to Install The Tool:
Installation of apktool is a straightforward process. The tool can be installed by cloning the Github repository
Git clone https://github.com/maaaaz/androwarn.git
pip install -r requirements.txt
You can also install using “pip install androwarn”
Dependencies
Python 3 or Python 2.7 + androguard + jinja2 + play_scraper + argparse
Androwarn Usage Example
-
androwarn -i [apk file] -r [html/json/txt] -v [1/2/3]
-
Essential ( -v 1)
-
Advanced (
-v 2
) -
Expert (
-v 3
)
To display the output in terminal
Androwarn -i [apk file] -r [html/json/txt] -d -v [1/2/3]
To test by log level
Androwarn -i [apk file] -r [html/json/txt] -L [
debug
/
info
/
warn
/
error
/
critical
/
DEBUG
/I
NFO
/
WARN
/
ERROR
/
CRITICAL
]
-v [1/2/3]
If installed through git clone
python androwarn.py -i [apkfile] -r html -v