android-pentest
Audited by Socket on Feb 28, 2026
7 alerts found:
Anomalyx3MalwareSecurityx2Obfuscated FileThis code is a runtime hooking script designed to bypass Android root detection mechanisms. It does not perform network exfiltration or credential harvesting, but it intentionally falsifies system information and blocks root-detection checks so an application will believe the device is not rooted. As such it is a tool to subvert application security and should be considered malicious for the purpose of defeating app integrity checks. It is low-risk in terms of direct data theft but high-risk in terms of undermining app security models.
The fragment is coherently aligned with its stated purpose as an Android pentest/assessment skill. It describes legitimate security-testing workflows (including root/SSL bypass and data extraction) using standard tooling. While the capabilities are high-risk, they are appropriate for authorized security testing when properly scoped and consented. There is an elevated supply-chain risk due to reliance on external tools and scripts; thus, provenance verification and strict access controls are essential before deployment.
The script itself is not obfuscated and contains no direct backdoor code, but it performs high-risk operations: it can download and execute a native Frida server binary from the network without integrity checks, start a powerful instrumentation server bound to configurable addresses (default 0.0.0.0), and change system-wide proxy settings. Those behaviors present a moderate-to-high supply-chain/security risk if the module or its configuration is untrusted. If used in an environment where the module and downloaded assets are fully trusted and controlled (e.g., a lab), the behavior is explainable; in production or on user devices it is dangerous. Recommend only using this module in controlled environments, adding verification of downloaded binaries (checksums/signatures), and restricting listen address and proxy configuration.
The provided code is an explicit authentication testing toolkit using Frida hooks that captures sensitive data (passwords, tokens, JWTs, SMS OTPs) to console logs and performs direct biometric bypass by invoking authentication success callbacks. As a testing tool it is legitimate in controlled environments, but if included as part of a package or executed in production it enables credential harvesting and local authentication bypass. The code itself does not show remote exfiltration or persistence, but it provides easy primitives to implement them. Treat as dangerous if present in production dependencies or shipped to end-users.
This Frida script is a comprehensive SSL/TLS pinning and hostname verification bypass for Android apps. It is a legitimate tool for authorized dynamic analysis and debugging, but it also fundamentally weakens transport security and enables MITM interception if used on production devices or by unauthorized actors. The code itself does not perform exfiltration, but it creates conditions that allow interception and credential/session compromise. Use only in controlled, authorized testing environments.
This script is not obfuscated and appears intended for legitimate pentesting/emulator configuration (install and run Frida, add CA certs, set proxy). However it performs high-privilege actions without integrity checks: enabling root, remounting system, pushing and executing an arbitrary Frida binary, and installing arbitrary CA certificates into the system trust store and setting global proxy. Those actions can be abused if the FRIDA_SERVER binary or certificate files are malicious or come from untrusted sources. For trusted operator-controlled inputs this is acceptable; for untrusted inputs it is a moderate-to-high risk. Recommend verifying FRIDA_SERVER binaries (checksums/signatures), validating certificate provenance, and limiting certificate/proxy configuration to trusted files/environments.
This is an explicit offensive dynamic-analysis guide providing Frida scripts and workflows to bypass app security (SSL pinning, root/emulator/anti-tamper detection), intercept/modify runtime behavior (authentication, biometric), and extract sensitive data (keys, credentials, clipboard, databases, network traffic). The content itself is not a packaged malware binary, but it enables high-impact attacks when used on target devices. Treat it as a dual-use tool: acceptable within authorized security testing, but dangerous if used without consent. Recommend restricting access, monitoring use, and not embedding these techniques in production dependencies or public libraries.