anais-apk-forensic
v1.0.2
Published
Comprehensive APK security analysis and forensic investigation tool for Android applications
Maintainers
Readme
Anais APK Forensic Automation
Automated security analysis tool for Android APK files. Built for security researchers, malware analysts, and penetration testers.
What it does
Anais analyzes APK files and generates detailed security reports. It can detect malware, identify vulnerabilities, and help you understand what an Android app is doing under the hood.
Features:
- Decompiles APKs with APKTool and JADX
- Scans for malware with YARA rules
- Detects obfuscation (ProGuard, R8, DPT-Shell, DexProtector, Bangcle)
- Runs static security analysis (SAST)
- Analyzes network behavior and manifest permissions
- Identifies encrypted payloads through entropy analysis
- Supports dynamic analysis with Frida
Installation
Prerequisites:
- Python 3.8+
- Java 8+
- Node.js 14+
- APKTool, JADX, and YARA
Install via npm:
npm install -g anais-apk-forensicOr from source:
git clone https://github.com/reezcode/Anais-APK-Forensic-Automation.git
cd Anais-APK-Forensic-Automation
npm install
npm run build
./scripts/setup.shUsage
Basic analysis:
anais /path/to/app.apkReports are saved to ~/Documents/Anais-Reports/ in both Markdown and JSON formats.
Dynamic analysis:
# Install Frida server
./scripts/dynamic_analysis_helper.sh install-frida
# Dump DEX from running app
./scripts/dynamic_analysis_helper.sh dex-dump com.package.name
# Hook crypto operations
./scripts/dynamic_analysis_helper.sh hook-crypto com.package.nameConfiguration
Edit analyzer_config.json to customize analysis behavior, enable/disable tools, or change output paths.
Report Output
Each analysis generates:
- report.md - Human-readable report with findings and recommendations
- report.json - Machine-readable data for automation
- Decompiled source code (APKTool and JADX output)
- YARA scan results
- SAST findings
- Network and manifest analysis
Severity levels:
- 🔴 CRITICAL (70-100): Confirmed malicious, take immediate action
- 🟠 HIGH (40-69): Suspicious, needs investigation
- 🟡 MEDIUM (20-39): Security concerns worth reviewing
- 🟢 LOW (0-19): Minor issues
Contributing
Pull requests welcome. Please fork the repo, create a feature branch, and submit a PR. 4. Submit a pull request
📝 License
This project is licensed under the MIT License - see the LICENSE file for details.
⚠️ Disclaimer
This tool is intended for security research and educational purposes only. Always obtain proper authorization before analyzing applications you do not own.
👤 Author
Reezcode24
License
MIT License - see LICENSE for details.
Author
Disclaimer
This tool is for authorized security testing and research only. Don't analyze apps you don't own without permission.
