Questions tagged [androguard]

Androguard is mainly a reverse engineering tool written in python to play with : Dex/Odex (Dalvik virtual machine) (.dex) (disassemble, decompilation), APK (Android application) (.apk), Android's binary xml (.xml), Android Resources (.arsc). Androguard is available for Linux/OSX/Windows (python powered).

Androguard is mainly a tool written in python to play with :

Dex/Odex (Dalvik virtual machine) (.dex) (disassemble, decompilation),
APK (Android application) (.apk),
Android's binary xml (.xml),
Android Resources (.arsc). 

Androguard is available for Linux/OSX/Windows (python powered).

More Details

33 questions
0
votes
1 answer

Androguard "internal" vs "external" classes

I am trying to get the API calls from the Android apk source code. I am currently using Androguard and it differentiates between internal and external classes/methods. I assume that the external relate to classes not compiled in dex format, thus…
Riddick
  • 29
  • 3
0
votes
0 answers

Has anyone encountered anything like this

WARNING:androguard.core.api_specific_resources:Requested API level 29 is larger than maximum we have, returning API level 28 instead. [INFO] 26/Oct/2021 09:54:16 - Running APKiD 2.1.2 [ERROR] 26/Oct/2021 09:54:16 - Error Performing Static…
0
votes
1 answer

How to extract any resource file from APK using the Androguard?

I want to extract any file like libraries(so files) and images(app icon, background image, ETC) using the Androguard. I know The a.get_app_icon() and a.get_files_information() method returns paths, but how can I extract them as real file using the…
0
votes
1 answer

How to determine which dx/d8 version was used for apk creation?

How to determine which dex compiler (dx/d8) version+flags were used in creating my apk? $ wget https://github.com/federicoiosue/Omni-Notes/releases/download/6.0.5/6.0.5.apk $ cat extract_dex_compiler.py from androguard.misc import…
OrenIshShalom
  • 5,974
  • 9
  • 37
  • 87
0
votes
0 answers

Debugging reversed Android Application without emulator for Dynamic Analysis

Suppose I download an android real-world app from Google Play and planned to do a dynamic analysis in the android application that received. thus, I first did the reverse engineering with apktool on the received android applications, and then by…
Yas
  • 31
  • 1
  • 8
0
votes
2 answers

Androguard: 'NameError: name 'AnalyzeAPK' is not defined' error

I am trying to use androguard to analyze a malware apk file but am facing the following error. In [1]: a,d,dx = AnalyzeAPK("malware.apk", decompiler="dad") NameError Traceback (most recent call…
0
votes
1 answer

Java methods name convention

Where can I find the documentation for the syntax of the method name convention used in Androguard? After searching for a while, it seems it's the same as in Java when a error happens. A code example: from androguard import misc import sys a, d, dx…
Kazh
  • 29
  • 8
0
votes
1 answer

How to extract filter intents from .apk with androguard or aapt?

I need to extract filter intents features from APK files and I could extract permission and Hardware component with androguard which is open source library and I used its APK class for extracting features but for filter intent, I've got an…
0
votes
1 answer

Building a Control Flow Graph for Android APK from smali code

Are there any tools out there that parse smali code directly to construct CFG? I know that Androguard does something similar but it seems to use decompilation on the apk file which can become unreliable in situations if the apk uses obfuscation…
Lew Wei Hao
  • 763
  • 1
  • 13
  • 25
0
votes
1 answer

How can I get actual value in AndroidManifest.xml using Androguard?

I tried to use androguard to analyze apk files, but some apk's AndroidManifest.xml do not show value directly, for example How can I retrieve the value of…
kkzxak47
  • 462
  • 7
  • 16
0
votes
1 answer

What is tainted packages by androguard?

The description of androguard function get_tainted_packages() is "Return the tainted packages". It seems all classes defined for the APP will be returned from my testing of this function. But what is the meaning of tainted packages ?
ybdesire
  • 1,593
  • 1
  • 20
  • 35
0
votes
1 answer

How to run malloDroid script?

I want to check SSL verification in my application. I downloaded on my santoku malloDroid.py and try use it (of course earlier I have read that script is an extansion of Androguard). I simply run mallo app: ./malloroid.py -f test.apk and i got…
0
votes
0 answers

How to escape characters in regex of Androguard?

I am using Androguard to do a static analysis of an apk file. I am using a, d, dx = AnalyzeAPK("/app-debug.apk", decompiler="dad") to decompile the apk. Then I am doing d.get_regex_strings(".*PackageManager.NameNotFoundException.*"). I know that…
You_got_it
  • 331
  • 3
  • 12
0
votes
1 answer

Is there a way in Androguard to determine whether a method is actually callable?

I want to do a static analysis of an Android app with Androguard. Particularly, I am interested to identify whether a particular library method is called. However, as the method call could be in a part of the code that is never reached, would the…
0
votes
1 answer

Error in python while running androguard importing zlib

I've been trying to run androguard on Ubuntu 13.10 I have downloaded the zlib library and placed it in the correct path While running the file apk.py , which has from zlib import crc32 it returns an error saying Cannot import name crc32 The zlib…