├── .idea
├── DroXES.iml
├── misc.xml
├── modules.xml
├── vcs.xml
└── workspace.xml
├── README.md
├── apk
├── SSLunpin.apk
├── busybox.apk
├── drozer.apk
├── inspeckage.apk
├── rootcloak.apk
├── term.apk
└── xposed.apk
├── bin
├── frida12.0.4
└── tcpdump
├── droxes.py
└── system
└── drozer.deb
/.idea/DroXES.iml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
--------------------------------------------------------------------------------
/.idea/misc.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
--------------------------------------------------------------------------------
/.idea/modules.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
--------------------------------------------------------------------------------
/.idea/vcs.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
--------------------------------------------------------------------------------
/.idea/workspace.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 |
54 |
55 |
56 |
57 |
58 |
59 |
60 |
61 |
62 |
63 |
64 |
65 |
66 |
67 |
68 |
69 |
70 |
71 |
72 |
73 |
74 |
75 |
76 |
77 |
78 |
79 |
80 |
81 |
82 |
83 |
84 |
85 |
86 |
87 |
88 |
89 |
90 |
91 |
92 |
93 |
94 |
95 |
96 |
97 |
98 |
99 |
100 |
101 |
102 |
103 |
104 |
105 |
106 |
107 |
108 |
109 |
110 |
111 |
112 |
113 |
114 |
115 |
116 |
117 |
118 |
119 |
120 |
121 |
122 |
123 |
124 |
125 |
126 |
127 |
128 |
129 |
130 |
131 |
132 |
133 |
134 |
135 |
136 |
137 |
138 |
139 |
140 |
141 |
142 |
143 |
144 |
145 |
146 |
147 |
148 |
149 |
150 |
151 |
152 |
153 |
154 |
155 |
156 |
157 |
158 |
159 |
160 |
161 |
162 |
163 |
164 |
165 |
166 |
167 |
168 |
169 |
170 |
171 |
172 |
173 |
174 |
175 |
176 |
177 |
178 |
179 |
180 |
181 |
182 |
183 |
184 |
185 |
186 |
187 |
188 |
189 |
190 |
191 |
192 |
193 |
194 |
195 |
196 |
197 |
198 |
199 |
200 |
201 |
202 |
203 |
204 |
205 |
206 |
207 |
208 |
209 |
210 |
211 |
212 |
213 |
214 |
215 |
216 |
217 |
218 |
219 |
220 |
221 |
222 |
223 |
224 |
225 |
226 |
227 |
228 |
229 |
230 |
231 |
232 |
233 |
234 |
235 |
236 |
237 |
238 |
239 |
240 |
241 |
242 |
243 |
244 |
245 |
246 |
247 |
248 |
249 |
250 |
251 |
252 |
253 |
254 |
255 |
256 |
257 |
258 |
259 |
260 |
261 |
262 |
263 |
264 |
265 |
266 |
267 |
268 |
269 | 1531893964565
270 |
271 |
272 | 1531893964565
273 |
274 |
275 |
276 |
277 |
278 |
279 |
280 |
281 |
282 |
283 |
284 |
285 |
286 |
287 |
288 |
289 |
290 |
291 |
292 |
293 |
294 |
295 |
296 |
297 |
298 |
299 |
300 |
301 |
302 |
303 |
304 |
305 |
306 |
307 |
308 |
309 |
310 |
311 |
312 |
313 |
314 |
315 |
316 |
317 |
318 |
319 |
320 |
321 |
322 |
323 |
324 |
325 |
326 |
327 |
328 |
329 |
330 |
331 |
332 |
333 |
334 |
335 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # DroXES
2 | ## Droid eXploitation Environment Setup
3 | ---
4 |
5 | A simple script to install the most necessary tools for security testing on your Android device/emulator and also to setup the host Linux system with all the required dependencies. The aim is to automate the environment setup as much as possible.
6 |
7 | ---
8 |
9 | ### PRE-REQUISITES:
10 |
11 | * Linux or MAC
12 | * Java JDK
13 |
14 | ---
15 |
16 | ## Tools Installed:
17 |
18 | ### APK Packages:
19 |
20 | * [Xposed](http://repo.xposed.info/module/de.robv.android.xposed.installer)
21 | * [Inspeckage](https://github.com/ac-pm/Inspeckage)
22 | * [Drozer](https://labs.mwrinfosecurity.com/tools/drozer/)
23 | * [Terminal Emulator](https://play.google.com/store/apps/details?id=jackpal.androidterm&hl=en)
24 | * [Busybox](https://play.google.com/store/apps/details?id=stericson.busybox)
25 | * [SSL Unpin](https://github.com/ac-pm/SSLUnpinning_Xposed)
26 | * [RootCloak](http://repo.xposed.info/module/com.devadvance.rootcloak2)
27 |
28 | ### Utilities
29 |
30 | * [Frida-server](https://frida.re/)
31 | * [tcpdump](https://www.androidtcpdump.com/)
32 |
33 | ### System Tools
34 |
35 | * [Drozer](https://labs.mwrinfosecurity.com/tools/drozer/)
36 | * [Frida-tools](https://frida.re/)
37 | * [ADB](https://developer.android.com/studio/command-line/adb)
38 |
39 | ---
40 |
41 | ## Usage:
42 |
43 | 1. Plug-in your device/start your emulator. Make sure USB Debugging is turned-on. [How to set USB debugging on](https://www.howtogeek.com/129728/how-to-access-the-developer-options-menu-and-enable-usb-debugging-on-android-4.2/)
44 | 2. Dowload the zip or clone the package and extract the tool ( ```git clone https://github.com/abhi-r3v0/DroXES.git``` ).
45 | 3. Open a terminal and cd into the directory.
46 | 4. Run ```python droxes.py```
47 |
48 | ---
49 |
50 | ## From India, to the world :blue_heart:
51 |
52 |
--------------------------------------------------------------------------------
/apk/SSLunpin.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/SSLunpin.apk
--------------------------------------------------------------------------------
/apk/busybox.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/busybox.apk
--------------------------------------------------------------------------------
/apk/drozer.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/drozer.apk
--------------------------------------------------------------------------------
/apk/inspeckage.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/inspeckage.apk
--------------------------------------------------------------------------------
/apk/rootcloak.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/rootcloak.apk
--------------------------------------------------------------------------------
/apk/term.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/term.apk
--------------------------------------------------------------------------------
/apk/xposed.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/xposed.apk
--------------------------------------------------------------------------------
/bin/frida12.0.4:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/bin/frida12.0.4
--------------------------------------------------------------------------------
/bin/tcpdump:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/bin/tcpdump
--------------------------------------------------------------------------------
/droxes.py:
--------------------------------------------------------------------------------
1 | # !/usr/bin/env python
2 |
3 | import os
4 | import ConfigParser
5 | import subprocess
6 | import threading
7 |
8 | __author__ = 'Abhishek J M ( jmabhishek4@gmail.com, @abhi_r3v0 )'
9 |
10 | class DroXES:
11 |
12 | def __init__(self):
13 | self.tool_list = ['xposed.apk', 'drozer.apk', 'term.apk', 'busybox.apk', 'rootcloak.apk', 'inspeckage.apk', 'SSLunpin.apk']
14 | self.bin_list = ['tcpdump', 'frida12.0.4']
15 | self.sys_list = ['android-tools-adb', 'python-pip','python3-pip', 'python-dev', 'python-twisted']
16 | self.py_dependencies = ['frida==12.0.4']
17 | self.sys_tools = ['drozer.deb']
18 |
19 | def welcome(self):
20 | print "\n dddddddd rrrrrrrr ooooooo xx xx eeeeeeee ssssssss\n" \
21 | " dd dd rr rr oo oo xx xx ee ss\n" \
22 | " dd dd rr rr oo oo xx xx ee ss\n" \
23 | " dd dd rr rrrr 00 oo xx xx eeeee ssssssss\n" \
24 | " dd dd rr rr oo oo xx xx ee ss\n" \
25 | " dd dd rr rr oo oo xx xx ee ss\n" \
26 | " dddddddd rr rr oooooo xx xx eeeeeeee ssssssss\n"
27 | print " ------------------------------------------------------------------"
28 | print "\n | TOOL : Droid eXploitation Environment Setup |"
29 | print " | AUTHOR : " + __author__ + " |"
30 | print " | VERSION : 1.0 |\n"
31 | print " ------------------------------------------------------------------"
32 |
33 |
34 | def install_sys_tools(self):
35 | print "\n[+] Setting up the system"
36 | for i in self.sys_list:
37 | subprocess.call(['sudo', 'apt-get', '-f', 'install', i], stdout=subprocess.PIPE, stderr=subprocess.PIPE)
38 | print "\t[+] Installed " + i
39 |
40 | for j in self.py_dependencies:
41 | subprocess.call(['sudo', '-H', 'pip', 'install', j], stdout=subprocess.PIPE, stderr=subprocess.PIPE)
42 | print "\t[+] Installed " + j
43 |
44 | for k in self.sys_tools:
45 | subprocess.call(['sudo', 'dpkg', '-i', os.getcwd() + "/system/" + k], stdout=subprocess.PIPE, stderr=subprocess.PIPE)
46 | print "\t[+] Installed " + k
47 |
48 | def install_tools(self):
49 | print "\n[+] Installing APK Tools"
50 | for i in self.tool_list:
51 | apkout = subprocess.check_output(['adb', 'install', '-r', os.getcwd() + "/apk/" + i], stderr=subprocess.PIPE)
52 | if 'Success' in apkout:
53 | print "\t[+] Installed " + i
54 | else:
55 | print "\t[-] Error Installing APK"
56 |
57 | def install_bin(self):
58 | print "\n[+] Installing Binary Tools"
59 | for i in self.bin_list:
60 | subprocess.Popen(['adb', 'push', os.getcwd() + '/bin/' + i, '/data/local/tmp'], stderr=subprocess.PIPE)
61 | print "\t[+] Installed " + i
62 |
63 | os.system('adb shell "chmod 755 /data/local/tmp/frida12.0.4"')
64 | os.system('adb shell "chmod 755 /data/local/tmp/tcpdump"')
65 |
66 | def main():
67 | dx = DroXES()
68 | dx.welcome()
69 | dx.install_sys_tools()
70 | dx.install_tools()
71 | dx.install_bin()
72 |
73 | if __name__ == '__main__':
74 | main()
75 |
76 |
--------------------------------------------------------------------------------
/system/drozer.deb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/system/drozer.deb
--------------------------------------------------------------------------------