├── .idea ├── DroXES.iml ├── misc.xml ├── modules.xml ├── vcs.xml └── workspace.xml ├── README.md ├── apk ├── SSLunpin.apk ├── busybox.apk ├── drozer.apk ├── inspeckage.apk ├── rootcloak.apk ├── term.apk └── xposed.apk ├── bin ├── frida12.0.4 └── tcpdump ├── droxes.py └── system └── drozer.deb /.idea/DroXES.iml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 11 | -------------------------------------------------------------------------------- /.idea/misc.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | -------------------------------------------------------------------------------- /.idea/modules.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | -------------------------------------------------------------------------------- /.idea/vcs.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | -------------------------------------------------------------------------------- /.idea/workspace.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 14 | 15 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 35 | 36 | 43 | 44 | 45 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 72 | 73 | 76 | 77 | 78 | 79 | 82 | 83 | 86 | 87 | 90 | 91 | 92 | 93 | 96 | 97 | 100 | 101 | 104 | 105 | 106 | 107 | 110 | 111 | 114 | 115 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 145 | 146 | 157 | 158 | 176 | 177 | 195 | 196 | 216 | 217 | 238 | 239 | 262 | 263 | 264 | 266 | 267 | 268 | 269 | 1531893964565 270 | 274 | 275 | 276 | 277 | 278 | 279 | 280 | 281 | 282 | 283 | 284 | 285 | 286 | 287 | 288 | 289 | 290 | 291 | 292 | 293 | 294 | 295 | 296 | 297 | 298 | 299 | 300 | 302 | 303 | 304 | 305 | 306 | 307 | 308 | 309 | 310 | 311 | 312 | 313 | 314 | 315 | 316 | 317 | 318 | 319 | 320 | 321 | 322 | 323 | 324 | 325 | 326 | 327 | 328 | 329 | 330 | 331 | 332 | 333 | 334 | 335 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # DroXES 2 | ## Droid eXploitation Environment Setup 3 | --- 4 | 5 | A simple script to install the most necessary tools for security testing on your Android device/emulator and also to setup the host Linux system with all the required dependencies. The aim is to automate the environment setup as much as possible. 6 | 7 | --- 8 | 9 | ### PRE-REQUISITES: 10 | 11 | * Linux or MAC 12 | * Java JDK 13 | 14 | --- 15 | 16 | ## Tools Installed: 17 | 18 | ### APK Packages: 19 | 20 | * [Xposed](http://repo.xposed.info/module/de.robv.android.xposed.installer) 21 | * [Inspeckage](https://github.com/ac-pm/Inspeckage) 22 | * [Drozer](https://labs.mwrinfosecurity.com/tools/drozer/) 23 | * [Terminal Emulator](https://play.google.com/store/apps/details?id=jackpal.androidterm&hl=en) 24 | * [Busybox](https://play.google.com/store/apps/details?id=stericson.busybox) 25 | * [SSL Unpin](https://github.com/ac-pm/SSLUnpinning_Xposed) 26 | * [RootCloak](http://repo.xposed.info/module/com.devadvance.rootcloak2) 27 | 28 | ### Utilities 29 | 30 | * [Frida-server](https://frida.re/) 31 | * [tcpdump](https://www.androidtcpdump.com/) 32 | 33 | ### System Tools 34 | 35 | * [Drozer](https://labs.mwrinfosecurity.com/tools/drozer/) 36 | * [Frida-tools](https://frida.re/) 37 | * [ADB](https://developer.android.com/studio/command-line/adb) 38 | 39 | --- 40 | 41 | ## Usage: 42 | 43 | 1. Plug-in your device/start your emulator. Make sure USB Debugging is turned-on. [How to set USB debugging on](https://www.howtogeek.com/129728/how-to-access-the-developer-options-menu-and-enable-usb-debugging-on-android-4.2/) 44 | 2. Dowload the zip or clone the package and extract the tool ( ```git clone https://github.com/abhi-r3v0/DroXES.git``` ). 45 | 3. Open a terminal and cd into the directory. 46 | 4. Run ```python droxes.py``` 47 | 48 | --- 49 | 50 | ## From India, to the world :blue_heart: 51 | 52 | -------------------------------------------------------------------------------- /apk/SSLunpin.apk: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/SSLunpin.apk -------------------------------------------------------------------------------- /apk/busybox.apk: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/busybox.apk -------------------------------------------------------------------------------- /apk/drozer.apk: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/drozer.apk -------------------------------------------------------------------------------- /apk/inspeckage.apk: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/inspeckage.apk -------------------------------------------------------------------------------- /apk/rootcloak.apk: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/rootcloak.apk -------------------------------------------------------------------------------- /apk/term.apk: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/term.apk -------------------------------------------------------------------------------- /apk/xposed.apk: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/apk/xposed.apk -------------------------------------------------------------------------------- /bin/frida12.0.4: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/bin/frida12.0.4 -------------------------------------------------------------------------------- /bin/tcpdump: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/bin/tcpdump -------------------------------------------------------------------------------- /droxes.py: -------------------------------------------------------------------------------- 1 | # !/usr/bin/env python 2 | 3 | import os 4 | import ConfigParser 5 | import subprocess 6 | import threading 7 | 8 | __author__ = 'Abhishek J M ( jmabhishek4@gmail.com, @abhi_r3v0 )' 9 | 10 | class DroXES: 11 | 12 | def __init__(self): 13 | self.tool_list = ['xposed.apk', 'drozer.apk', 'term.apk', 'busybox.apk', 'rootcloak.apk', 'inspeckage.apk', 'SSLunpin.apk'] 14 | self.bin_list = ['tcpdump', 'frida12.0.4'] 15 | self.sys_list = ['android-tools-adb', 'python-pip','python3-pip', 'python-dev', 'python-twisted'] 16 | self.py_dependencies = ['frida==12.0.4'] 17 | self.sys_tools = ['drozer.deb'] 18 | 19 | def welcome(self): 20 | print "\n dddddddd rrrrrrrr ooooooo xx xx eeeeeeee ssssssss\n" \ 21 | " dd dd rr rr oo oo xx xx ee ss\n" \ 22 | " dd dd rr rr oo oo xx xx ee ss\n" \ 23 | " dd dd rr rrrr 00 oo xx xx eeeee ssssssss\n" \ 24 | " dd dd rr rr oo oo xx xx ee ss\n" \ 25 | " dd dd rr rr oo oo xx xx ee ss\n" \ 26 | " dddddddd rr rr oooooo xx xx eeeeeeee ssssssss\n" 27 | print " ------------------------------------------------------------------" 28 | print "\n | TOOL : Droid eXploitation Environment Setup |" 29 | print " | AUTHOR : " + __author__ + " |" 30 | print " | VERSION : 1.0 |\n" 31 | print " ------------------------------------------------------------------" 32 | 33 | 34 | def install_sys_tools(self): 35 | print "\n[+] Setting up the system" 36 | for i in self.sys_list: 37 | subprocess.call(['sudo', 'apt-get', '-f', 'install', i], stdout=subprocess.PIPE, stderr=subprocess.PIPE) 38 | print "\t[+] Installed " + i 39 | 40 | for j in self.py_dependencies: 41 | subprocess.call(['sudo', '-H', 'pip', 'install', j], stdout=subprocess.PIPE, stderr=subprocess.PIPE) 42 | print "\t[+] Installed " + j 43 | 44 | for k in self.sys_tools: 45 | subprocess.call(['sudo', 'dpkg', '-i', os.getcwd() + "/system/" + k], stdout=subprocess.PIPE, stderr=subprocess.PIPE) 46 | print "\t[+] Installed " + k 47 | 48 | def install_tools(self): 49 | print "\n[+] Installing APK Tools" 50 | for i in self.tool_list: 51 | apkout = subprocess.check_output(['adb', 'install', '-r', os.getcwd() + "/apk/" + i], stderr=subprocess.PIPE) 52 | if 'Success' in apkout: 53 | print "\t[+] Installed " + i 54 | else: 55 | print "\t[-] Error Installing APK" 56 | 57 | def install_bin(self): 58 | print "\n[+] Installing Binary Tools" 59 | for i in self.bin_list: 60 | subprocess.Popen(['adb', 'push', os.getcwd() + '/bin/' + i, '/data/local/tmp'], stderr=subprocess.PIPE) 61 | print "\t[+] Installed " + i 62 | 63 | os.system('adb shell "chmod 755 /data/local/tmp/frida12.0.4"') 64 | os.system('adb shell "chmod 755 /data/local/tmp/tcpdump"') 65 | 66 | def main(): 67 | dx = DroXES() 68 | dx.welcome() 69 | dx.install_sys_tools() 70 | dx.install_tools() 71 | dx.install_bin() 72 | 73 | if __name__ == '__main__': 74 | main() 75 | 76 | -------------------------------------------------------------------------------- /system/drozer.deb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhi-r3v0/DroXES/33227ffc381df55801d31eb953f832ec03f8fbdf/system/drozer.deb --------------------------------------------------------------------------------