AndroidSecurityStudy  by r0ysue

Android security study resource

created 5 years ago
4,170 stars

Top 11.9% on sourcepulse

GitHubView on GitHub
Project Summary

This repository serves as a comprehensive learning resource for Android application security, targeting security researchers and developers interested in reverse engineering and dynamic analysis. It provides tools, guides, and practical examples for mastering techniques like Frida hooking, FART (Frida-assisted runtime transformation) for unpacking, and KernelSU for advanced system-level access.

How It Works

The project centers around the Frida dynamic instrumentation toolkit, offering extensive tutorials on its API usage, scripting, and practical applications like network traffic capture and binary analysis. It also features FART, a custom unpacking solution, and guides for integrating KernelSU for deeper system access, enabling advanced debugging and analysis on rooted or custom kernel devices.

Quick Start & Requirements

  • Installation: Primarily involves setting up a suitable Android environment (e.g., rooted devices, emulators, or cloud phones) and installing Frida. Specific tools like FART may require custom ROMs or specific device models (e.g., Nexus5x, Pixel1(XL) for Fart8).
  • Prerequisites: Rooted Android devices (various Pixel, OnePlus, Xiaomi models mentioned), specific Android versions (8.1, 9, 10, 13), potentially custom kernels (KernelSU), and familiarity with Frida. Some tools are distributed via paid platforms (e.g., Knowledge Planet, Xiaoe Tech).
  • Resources: Detailed guides for setting up environments are provided, including links to Kali Linux VMs and specific device flashing instructions.

Highlighted Details

  • Extensive Frida tutorials covering Java hooking, native code analysis, RPC, and memory manipulation.
  • FART tools and guides for unpacking Android applications, including custom ART interpreter modifications.
  • KernelSU integration for advanced system access, with specific device and Android version compatibility notes.
  • Guides for iOS reverse engineering and network capturing are also included.

Maintenance & Community

The project is maintained by r0ysue. Community engagement is encouraged via WeChat for Frida/FART groups. Some content and tools are linked to paid platforms.

Licensing & Compatibility

The repository's licensing is not explicitly stated in the README. Some tools and guides may have specific hardware or software requirements, and content is sometimes distributed via paid platforms, implying potential restrictions on redistribution or commercial use.

Limitations & Caveats

Some tools, like Fart8, have very specific hardware requirements. Certain advanced features or updates are marked as "todo" and may not be fully implemented or released. The project links to paid content, which may be a barrier for some users.

Health Check
Last commit

1 year ago

Responsiveness

Inactive

Pull Requests (30d)
0
Issues (30d)
0
Star History
106 stars in the last 90 days

Explore Similar Projects

Feedback? Help us improve.