Androwarn Tool to Detect and warn potential malicious behaviours

Image

Androwarn is an instrument whose primary point is to identify and caution the client about potential pernicious practices developped by an Android application.

The identification is performed with the static examination of the application's Dalvik bytecode, spoke to as Smali, with the androguard library.

This investigation prompts the age of a report, as indicated by a specialized detail level browsed the client.

Demo

Lock image

How to Install The Tool:

Installation of apktool is a straightforward process. The tool can be installed by cloning the Github repository

Git clone https://github.com/maaaaz/androwarn.git

pip install -r requirements.txt

 You can also install using “pip install androwarn”

Dependencies

Python 3 or Python 2.7 + androguard + jinja2 + play_scraper + argparse

Androwarn Usage Example

  • androwarn -i [apk file] -r [html/json/txt] -v [1/2/3]

  • Essential      ( -v 1)

  • Advanced     (-v 2)

  • Expert        (-v 3)

To display the output in terminal

Androwarn -i [apk file] -r [html/json/txt] -d -v [1/2/3]

To test by log level

Androwarn -i [apk file] -r [html/json/txt] -L [debug/info/warn/error/critical/DEBUG/INFO/WARN/ERROR/CRITICAL]  -v [1/2/3]

If installed through git clone

python androwarn.py -i [apkfile] -r html -v