Skip to content

DarioI/ARES

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

89 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ARES - Android Reverse Engineering Suite

Build status:
Build Status

ARES is a security suite for analyzing Android .apk files. Core analysis technology is based on the awesome Androguard codebase.

##Features

  • Load .APK from system or dump from connected device
  • Android Permissions overview
  • Application information
  • Scan and show privacy leaks
  • Show usage of reflection code
  • Show usage of dynamic code update
  • Show usage of crypto code
  • Show usage of permissions
  • Show strings and manifest
  • Decompilation and browsing through .java sources (integration of the Androguard Gui app)
  • Decompilation and visualisation of bytecode with description lookup for bytecodes

##Development Phase It is still heavily under development. Pull requests are appreciated.

The sole purpose of this tool is for educational and security research purposes only. Use it on your own responsibility.

How to run

  • Make sure Python 2.7 is installed and on your path
  • Make sure Android Debug Bridge (ADB) is installed and on your path
  • Install pip
  • Download ARES and install requirements, run in a terminal:
git clone https://github.com/DarioI/ARES.git
cd ARES
pip install -r requirements.txt
  • Run ARES:
./ares.py

Things to keep in mind

  • Make sure you are running adb version 1.0.32. Check your version using:
adb version
  • When you run into any kind of problems where ARES starts complaining about not being able to connect with the Android device, make sure you can see the device in the adb list. To avoid any problems stop and start the adb server as root.
adb kill-server
sudo adb start-server
adb devices

Any bugs or problems, please mail to dario.incalza@gmail.com

##Roadmap

  • Add Simplify pre-processing to remove encryption and eliminate dead-code in app
  • Project management: save progress on an apk sample and make it possible to resume analysis
  • Instrument APKs
  • Sign instrumented APKs

##Dependencies

  • docutils
  • dumpey
  • Flask
  • IPy
  • ipython
  • PySide

##First Screenshots First screenshot

##License ###ARES Copyright (C) 2015, Dario Incalza dario.incalza@gmail.com All rights reserved.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS-IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

###Androguard Copyright (C) 2012/2013/2014, Anthony Desnos All rights reserved.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS-IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

###DAD

Copyright (C) 2012/2013/2014, Geoffroy Gueguen geoffroy.gueguen@gmail.com All rights reserved.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS-IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

About

ARES: Android Reverse Engineering Suite is a security suite for analyzing Android .apk files.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages