AndroGuard

Description

AndroGuard – Reverse engineering, Malware and goodware analysis of Android applications … and more.

 

AndroaXML

AndroGuard – androaxml [options]

Options

  -h, --help            show this help message and exit
  -i INPUT, --input=INPUT
                        filename input (APK or android's binary xml)
  -o OUTPUT, --output=OUTPUT
                        filename output of the xml
  -v, --version         version of the API AndroGuard 

Example

cyborg@cyborg:~$ androaxml -i ztr.apk

<?xml version="1.0" encoding="utf-8"?>
<manifest android:versionCode="1" android:versionName="1.0" package="com.goyal.website2apk" platformBuildVersionCode="22" platformBuildVersionName="5.1.1-1819727" xmlns:android="http://schemas.android.com/apk/res/android">
 <uses-sdk android:minSdkVersion="10" android:targetSdkVersion="22">
</uses-sdk>
 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE">
</uses-permission>
    <uses-permission android:name="android.permission.ACCESS_FINE_LOCATION">
</uses-permission>
      <application android:allowBackup="true" android:icon="@7F020002" android:label="@7F050002" android:theme="@android:01030006">
        
        <activity android:configChanges="0x000004A0" android:label="@7F050002" android:name="com.goyal.website2apk.MainActivity">
            <intent-filter>
              <action android:name="android.intent.action.MAIN">
</action>
                <category android:name="android.intent.category.LAUNCHER">
</category>
        </intent-filter>
        </activity>
    </application>
 </manifest>


AndroAPKinfo

AndroGuard – androapkinfo [options]

Options

  -h, --help            show this help message and exit
  -i INPUT,--input=INPUT
                        file : use this filename (APK)
  -d DIRECTORY,--directory=DIRECTORY
                        directory : use this directory
  -t, --tag             display tags
  -v, --version         version AndroGuard 

Example

cyborg@cyborg:~$ sudo androapkinfo -i example.apk
ztr.apk : AndroGuard 
FILES: 
    META-INF/MANIFEST.MF ASCII text, with CRLF line terminators 5679b4ea
    META-INF/CERT.SF ASCII text, with CRLF line terminators 6c0768bd
    META-INF/CERT.RSA data 7773b89a
    res/layout/spinr.xml data -208b11e2
    AndroidManifest.xml data -48c58a1e
    res/layout/activity_main.xml data -1dfc7a00
    res/drawable/ic_launcher.png PNG image data, 90 x 90, 8-bit/color RGBA, non-interlaced -2871bc1f
    res/layout-v17/activity_main.xml data -60d1d2f7
    res/drawable/about.png PNG image data, 47 x 47, 8-bit gray+alpha, non-interlaced 24684b27
    res/drawable/exit.png PNG image data, 47 x 47, 8-bit colormap, non-interlaced -33aacfbf
    res/drawable/wheel.png PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced 5c1c9291
    res/drawable/splash.png PNG image data, 424 x 713, 8-bit/color RGBA, non-interlaced 3443601b
    assets/404r.html HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators 46ab558e
    resources.arsc data -738388af
    res/menu/menu_main.xml data 100c43ec
    classes.dex Dalvik dex file version 035 -48b881f9
    assets/index.html HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators -f0fe02e
PERMISSIONS:  AndroGuard 
    android.permission.ACCESS_FINE_LOCATION ['dangerous', 'fine (GPS) location', 'Access fine location sources, such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are and may consume additional battery power.']
    android.permission.READ_EXTERNAL_STORAGE ['normal', 'read from external storage', 'Allows an application to read from external storage'] AndroGuard
    android.permission.CAMERA ['dangerous', 'take pictures and videos', 'Allows application to take pictures and videos with the camera. This allows the application to collect images that the camera is seeing at any time.']
    android.permission.ACCESS_COARSE_LOCATION ['dangerous', 'coarse (network-based) location', 'Access coarse location sources, such as the mobile network database, to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.']
    android.permission.ACCESS_NETWORK_STATE ['normal', 'view network status', 'Allows an application to view the status of all networks.']
    android.permission.INTERNET ['dangerous', 'full Internet access', 'Allows an application to create network sockets.']
    android.permission.WRITE_EXTERNAL_STORAGE ['dangerous', 'modify/delete SD card contents', 'Allows an application to write to the SD card.']
MAIN ACTIVITY:  com.goyal.website2apk.MainActivity
ACTIVITIES:  AndroGuard 
    com.goyal.website2apk.MainActivity {'action': [u'android.intent.action.MAIN'], 'category': [u'android.intent.category.LAUNCHER']}
SERVICES: 
RECEIVERS: 
PROVIDERS:  []
Native code: False
Dynamic code: False
Reflection code: False
Ascii Obfuscation: False
Lcom/goyal/website2apk/MainActivity; <init> ['ANDROID', 'APP']
Lcom/goyal/website2apk/MainActivity; onActivityResult ['ANDROID', 'CONTENT', 'NET', 'WEBKIT', 'APP']
Lcom/goyal/website2apk/MainActivity; onBackPressed ['ANDROID', 'WEBKIT']
Lcom/goyal/website2apk/MainActivity; onConfigurationChanged ['ANDROID', 'APP']
Lcom/goyal/website2apk/MainActivity; onCreate ['ANDROID', 'WEBKIT', 'WIDGET', 'APP', 'NET', 'OS']
Lcom/goyal/website2apk/MainActivity; onCreateOptionsMenu ['ANDROID', 'VIEW']
Lcom/goyal/website2apk/MainActivity; onKeyDown ['ANDROID', 'VIEW', 'WEBKIT', 'APP']
Lcom/goyal/website2apk/MainActivity; onOptionsItemSelected ['ANDROID', 'VIEW', 'APP']
Lcom/goyal/website2apk/a; run ['ANDROID', 'WEBKIT', 'WIDGET']
Lcom/goyal/website2apk/b; <init> ['ANDROID', 'WEBKIT']
Lcom/goyal/website2apk/b; a ['ANDROID', 'OS'] AndroGuard 
Lcom/goyal/website2apk/b; onProgressChanged ['ANDROID', 'WIDGET']
Lcom/goyal/website2apk/b; onShowFileChooser ['ANDROID', 'CONTENT', 'UTIL', 'WEBKIT', 'NET']
Lcom/goyal/website2apk/c; <init> ['ANDROID', 'WEBKIT']
Lcom/goyal/website2apk/c; a ['ANDROID', 'CONTENT', 'NET', 'WEBKIT']
Lcom/goyal/website2apk/c; onReceivedError ['ANDROID', 'WEBKIT']
Lcom/goyal/website2apk/c; shouldOverrideUrlLoading ['ANDROID', 'WEBKIT']
Lcom/goyal/website2apk/d; onDownloadStart ['ANDROID', 'CONTENT', 'NET']


AndroDD

AndroGuard – androdd [options]

Options

  -i INPUT, --input=INPUT
                        file : use this filename
  -o OUTPUT, --output=OUTPUT
                        base directory to output all files
  -d DECOMPILER, --decompiler=DECOMPILER
                        choose a decompiler
  -j, --jar             output jar file
  -f FORMAT, --format=FORMAT
                        write the method in specific format (png, ...)
  -l LIMIT, --limit=LIMIT
                        limit analysis to specific methods/classes by using a
                        regexp
  -v, --version         version of the API AndroGuard 

Options

cyborg@cyborg:~$ sudo androdd -i example.apk -o output
Dump information example.apk in output
Clean directory output
Analysis ... End
Decompilation ... End
Dump Lcom/goyal/website2apk/MainActivity; <clinit> ()V ... source codes ... bytecodes ...
Dump Lcom/goyal/website2apk/MainActivity; <init> ()V ... bytecodes ...
Dump Lcom/goyal/website2apk/MainActivity; a (Lcom/goyal/website2apk/MainActivity;)Landroid/webkit/ValueCallback; ... bytecodes ...
Dump Lcom/goyal/website2apk/MainActivity; a (Lcom/goyal/website2apk/MainActivity; Landroid/webkit/ValueCallback;)Landroid/webkit/ValueCallback; ... bytecodes ...
Dump Lcom/goyal/website2apk/MainActivity; a ()Ljava/lang/String; ... bytecodes ...
Dump Lcom/goyal/website2apk/MainActivity; a (Lcom/goyal/website2apk/MainActivity; Ljava/lang/String;)Ljava/lang/String; ... bytecodes ...
Dump Lcom/goyal/website2apk/MainActivity; b (Lcom/goyal/website2apk/MainActivity;)Ljava/lang/String; ... bytecodes ...
Dump Lcom/goyal/website2apk/MainActivity; onActivityResult (I I Landroid/content/Intent;)V ... bytecodes ...
Dump Lcom/goyal/website2apk/MainActivity; onBackPressed ()V ... bytecodes ... AndroGuard 
Dump Lcom/goyal/website2apk/MainActivity; onConfigurationChanged (Landroid/content/res/Configuration;)V ... bytecodes ...
Dump Lcom/goyal/website2apk/MainActivity; onCreate (Landroid/os/Bundle;)V ... bytecodes ...
Dump Lcom/goyal/website2apk/MainActivity; onCreateOptionsMenu (Landroid/view/Menu;)Z ... bytecodes ...
Dump Lcom/goyal/website2apk/MainActivity; onKeyDown (I Landroid/view/KeyEvent;)Z ... bytecodes ...
Dump Lcom/goyal/website2apk/MainActivity; onOptionsItemSelected (Landroid/view/MenuItem;)Z ... bytecodes ...
Dump Lcom/goyal/website2apk/a; <init> (Lcom/goyal/website2apk/MainActivity;)V ... source codes ... bytecodes ...
Dump Lcom/goyal/website2apk/a; run ()V ... bytecodes ...
Dump Lcom/goyal/website2apk/b; <init> (Lcom/goyal/website2apk/MainActivity;)V ... source codes ... bytecodes ...
Dump Lcom/goyal/website2apk/b; a ()Ljava/io/File; ... bytecodes ... AndroGuard 
Dump Lcom/goyal/website2apk/b; onProgressChanged (Landroid/webkit/WebView; I)V ... bytecodes ...
Dump Lcom/goyal/website2apk/b; onShowFileChooser (Landroid/webkit/WebView; Landroid/webkit/ValueCallback; Landroid/webkit/WebChromeClient$FileChooserParams;)Z ... bytecodes ...
Dump Lcom/goyal/website2apk/c; <init> (Lcom/goyal/website2apk/MainActivity;)V ... source codes ... bytecodes ...
Dump Lcom/goyal/website2apk/c; a (Ljava/lang/String;)Ljava/lang/Boolean; ... bytecodes ...
Dump Lcom/goyal/website2apk/c; onReceivedError (Landroid/webkit/WebView; I Ljava/lang/String; Ljava/lang/String;)V ... bytecodes ...
Dump Lcom/goyal/website2apk/c; shouldOverrideUrlLoading (Landroid/webkit/WebView; Ljava/lang/String;)Z ... bytecodes ...
Dump Lcom/goyal/website2apk/d; <init> (Lcom/goyal/website2apk/MainActivity;)V ... source codes ... bytecodes ...
Dump Lcom/goyal/website2apk/d; onDownloadStart (Ljava/lang/String; Ljava/lang/String; Ljava/lang/String; Ljava/lang/String; J)V ... bytecodes ...

AndroDiff

AndroGuard – androdiff [options]

Options

  -i INPUT, --input=INPUT
                        file : use these filenames
  -t THRESHOLD, --threshold=THRESHOLD AndroGuard 
                        define the threshold
  -c COMPRESSOR, --compressor=COMPRESSOR
                        define the compressor
  -d, --display         display the file in human readable format
  -e EXCLUDE, --exclude=EXCLUDE
                        exclude specific class name (python regexp)
  -s SIZE, --size=SIZE  exclude specific method below the specific size
  -v, --version         version of the API AndroGuard 

Example

cyborg@cyborg:~$ sudo androdiff -i example.apk test2.apk
<androguard.core.bytecodes.dvm.DalvikVMFormat object at 0x7f58fdb06950> <androguard.core.analysis.analysis.VMAnalysis instance at 0x7f58fd1417a0> <androguard.core.bytecodes.dvm.DalvikVMFormat object at 0x7f58fdafd410> <androguard.core.analysis.analysis.VMAnalysis instance at 0x7f58fba80ef0>
Elements:
     IDENTICAL:    4
     SIMILAR:     4
     NEW:        2558
     DELETED:    13
     SKIPPED:    0
[ ('Lcom/goyal/website2apk/MainActivity;', '<init>', '()V') ] <-> [ ('Lcom/epic/launcher/dg;', '<init>', '()V') ]
<init>[email protected] <init>[email protected]
Added Elements(10) AndroGuard 
    0x0 0 const/4 v2, 1
    0x2 1 const/4 v1, 0
    0xa 3 const-string v0, ''
    0xe 4 iput-object v0, v3, Lcom/epic/launcher/dg;->l Ljava/lang/String;
    0x12 5 iput-boolean v1, v3, Lcom/epic/launcher/dg;->H Z
    0x16 6 iput-boolean v1, v3, Lcom/epic/launcher/dg;->I Z
    0x1a 7 iput-boolean v1, v3, Lcom/epic/launcher/dg;->J Z
    0x1e 8 iput-boolean v2, v3, Lcom/epic/launcher/dg;->K Z
    0x22 9 iput-boolean v2, v3, Lcom/epic/launcher/dg;->L Z
    0x26 10 iput-boolean v2, v3, Lcom/epic/launcher/dg;->M Z

AndroGEXF

AndroGuard – androgexf [options]

Options

  -i INPUT, --input=INPUT
                        filename input (dex, apk)
  -o OUTPUT, --output=OUTPUT
                        filename output of the gexf

Example

cyborg@cyborg:~$ sudo androgexf -i example.apk -o out.gexf
Let see the output file:
cyborg@cyborg:~/androguard$ cat out.gexf 
<?xml version="1.0" encoding="UTF-8"?>
<gexf xmlns="http://www.gephi.org/gexf" xmlns:viz="http://www.gephi.org/gexf/viz">
<graph type="static">
<attributes class="node" type="static">
<attribute default="normal" id="0" title="type" type="string"/>
<attribute id="1" title="class_name" type="string"/>
<attribute id="2" title="method_name" type="string"/>
<attribute id="3" title="descriptor" type="string"/>
<attribute default="0" id="4" title="permissions" type="integer"/>
<attribute default="normal" id="5" title="permissions_level" type="string"/>
<attribute default="false" id="6" title="dynamic_code" type="boolean"/>
</attributes>
<nodes>
<node id="0" label="Lcom/goyal/website2apk/MainActivity; onCreate (Landroid/os/Bundle;)V">
<viz:color r="51" g="255" b="51"/>
<attvalues>
<attvalue id="1" value="Lcom/goyal/website2apk/MainActivity;"/>
<attvalue id="2" value="onCreate"/>
<attvalue id="3" value="(Landroid/os/Bundle;)V"/>
<attvalue id="0" value="activity"/>
<attvalue id="6" value="false"/>
</attvalues>
</node>
<node id="1" label="Lcom/goyal/website2apk/b; &lt;init&gt; (Lcom/goyal/website2apk/MainActivity;)V">

Androlyze

AndroGuard – androlyze [options]

Options

  -i INPUT, --input=INPUT
                        file : use this filename
  -d, --display         display the file in human readable format
  -m METHOD, --method=METHOD
                        display method(s) respect with a regexp
  -f FIELD, --field=FIELD
                        display field(s) respect with a regexp
  -s, --shell           open an interactive shell to play more easily with
                        objects
  -v, --version         version of the API AndroGuard 
  -p, --pretty          pretty print ! AndroGuard 
  -x, --xpermissions    show paths of permissions

Example

cyborg@cyborg:~$ androlyze -d -i example.apk
/usr/lib/python2.7/dist-packages/IPython/frontend.py:30: UserWarning: The top-level `frontend` package has been deprecated. All its subpackages have been moved to the top `IPython` level.
  warn("The top-level `frontend` package has been deprecated. "
MAP_LIST SIZE 0xd
    MAP_TYPE_ITEM TYPE_HEADER_ITEM
########## Header Item
magic=14974455192773988, checksum=-1134015543, signature=)o��t��^��fP�m��G8�
file_size=26c4, header_size=70, endian_tag=12345678
link_size=0, link_off=0
map_off=2624
string_ids_size=d0, string_ids_off=70
type_ids_size=3c, type_ids_off=3b0
proto_ids_size=43, proto_ids_off=4a0
field_ids_size=f, field_ids_off=7c4
method_ids_size=74, method_ids_off=83c
class_defs_size=5, class_defs_off=bdc
data_size=1a48, data_off=c7c
    MAP_TYPE_ITEM TYPE_STRING_ID_ITEM
########## String Id Item
string_data_off=c7c
########## String Id Item
string_data_off=c82

AndroRisk

AndroGuard – androrisk [options]

Options

   -i INPUT, --input=INPUT
                        file : use these filenames
  -m, --method          perform analysis of each method
  -d DIRECTORY, --directory=DIRECTORY
                        directory : use this directory
  -v, --version         version of the API AndroGuard 

Example

cyborg@cyborg:~$ sudo androrisk --input=test.apk
test.apk
    RedFlags
        DEX {'NATIVE': 0, 'DYNAMIC': 0, 'CRYPTO': 0, 'REFLECTION': 0}
        APK {'DEX': 0, 'EXECUTABLE': 0, 'ZIP': 0, 'SHELL_SCRIPT': 0, 'APK': 0, 'SHARED LIBRARIES': 0}
        PERM {'PRIVACY': 3, 'NORMAL': 2, 'MONEY': 0, 'INTERNET': 1, 'SMS': 0, 'DANGEROUS': 5, 'SIGNATUREORSYSTEM': 0, 'CALL': 0, 'SIGNATURE': 0, 'GPS': 2}
    FuzzyRisk
        VALUE 50.0

AndroXGMML

AndroGuard – androxgmml [options]

Options

  -i INPUT, --input=INPUT
                        filename input
  -o OUTPUT, --output=OUTPUT
                        filename output of the xgmml
  -f, --functions       include function calls
  -e, --externals       include extern function calls
  -v, --version         version of the API AndroGuard 
Example
cyborg@cyborg:~$ python androxgmml -i example.apk -o out.xgmml

Now, Viewing resulting xgmml file
cyborg@cyborg:~$ cat out.xgmml
<?xml version='1.0'?>
<graph label="Androguard XGMML ztr.apk" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ns1="http://www.w3.org/1999/xlink" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://www.cs.rpi.edu/XGMML" directed="1">
<node id="0" label="Lcom/goyal/website2apk/MainActivity;-&lt;clinit&gt;[email protected]()V">
<att type="string" name="classname" value="Lcom/goyal/website2apk/MainActivity;"/>
<att type="string" name="name" value="&lt;clinit&gt;"/>
<att type="string" name="descriptor" value="()V"/>
<att type="integer" name="offset" value="0"/>
<att type="string" name="node.label" value="&lt;clinit&gt;\nreturn-void"/>
<graphics type="ELLIPSE" h="40.0" w="40.0" width="3" fill="#ff0000" outline="#000000">
</graphics>
</node>
<node id="1" label="Lcom/goyal/website2apk/MainActivity;-&lt;init&gt;[email protected]()V">
<att type="string" name="classname" value="Lcom/goyal/website2apk/MainActivity;"/>
<att type="string" name="name" value="&lt;init&gt;"/>
<att type="string" name="descriptor" value="()V"/>
<att type="integer" name="offset" value="0"/>
<att type="string" name="node.label" value="&lt;init&gt;\nreturn-void"/>
<graphics type="ELLIPSE" h="40.0" w="40.0" width="3" fill="#ff0000" outline="#000000">
</graphics>
</node>
<node id="2" label="Lcom/goyal/website2apk/MainActivity;[email protected](Lcom/goyal/website2apk/MainActivity;)Landroid/webkit/ValueCallback;">
<att type="string" name="classname" value="Lcom/goyal/website2apk/MainActivity;"/>
<att type="string" name="name" value="a"/>
<att type="string" name="descriptor" value="(Lcom/goyal/website2apk/MainActivity;)Landroid/webkit/ValueCallback;"/>
<att type="integer" name="offset" value="0"/>
<att type="string" name="node.label" value="a\nreturn-object"/>
<graphics type="ELLIPSE" h="40.0" w="40.0" width="3" fill="#ff0000" outline="#000000">
</graphics>
</node>
<node id="3" label="Lcom/goyal/website2apk/MainActivity;[email protected](Lcom/goyal/website2apk/MainActivity; Landroid/webkit/ValueCallback;)Landroid/webkit/ValueCallback;">
<att type="string" name="classname" value="Lcom/goyal/website2apk/MainActivity;"/>
<att type="string" name="name" value="a"/>
<att type="string" name="descriptor" value="(Lcom/goyal/website2apk/MainActivity; Landroid/webkit/ValueCallback;)Landroid/webkit/ValueCallback;"/>
<att type="integer" name="offset" value="0"/>
<att type="string" name="node.label" value="a\nreturn-object"/>
<graphics type="ELLIPSE" h="40.0" w="40.0" width="3" fill="#ff0000" outline="#000000">
</graphics>
</node>
<node id="4" label="Lcom/goyal/website2apk/MainActivity;[email protected]()Ljava/lang/String;">

APKviewer

AndroGuard – apkviewer [options]

Options

  -i INPUT, --input=INPUT
                        filename input (dex, apk)
  -o OUTPUT, --output=OUTPUT
                        directory output
Example
cyborg@cyborg:~$ sudo apkviewer -i example.apk -o xyz
META-INF/MANIFEST.MF ASCII text, with CRLF line terminators 1450816746 MANIFEST.MF
META-INF/CERT.SF ASCII text, with CRLF line terminators 1812424893 CERT.SF
META-INF/CERT.RSA data 2004072602 CERT.RSA
res/layout/spinr.xml data -545984994 spinr.xml
AndroidManifest.xml data -1220905502 AndroidManifest.xml
res/layout/activity_main.xml data -503085568 activity_main.xml
res/drawable/ic_launcher.png PNG image data, 90 x 90, 8-bit/color RGBA, non-interlaced -678542367 ic_launcher.png
res/layout-v17/activity_main.xml data -1624363767 activity_main.xml
res/drawable/about.png PNG image data, 47 x 47, 8-bit gray+alpha, non-interlaced 610814759 about.png
res/drawable/exit.png PNG image data, 47 x 47, 8-bit colormap, non-interlaced -866832319 exit.png
res/drawable/wheel.png PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced 1545376401 wheel.png
res/drawable/splash.png PNG image data, 424 x 713, 8-bit/color RGBA, non-interlaced 876830747 splash.png
assets/404r.html HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators 1185633678 404r.html
resources.arsc data -1938000047 resources.arsc
res/menu/menu_main.xml data 269239276 menu_main.xml AndroGuard 
classes.dex Dalvik dex file version 035 -1220051449 classes.dex
assets/index.html HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators -252698670 index.html

onCreate {'exceptions_entropy': 0, 'signature_entropy': 4.978121085147617, 'color': (51, 255, 51), 'permissions_level': -1, 'hex_entropy': 4.349816777488304, 'dynamic_code': 'false', 'java_api_entropy': 4.497767228453798, 'android_api_entropy': 4.844385878532378, 'signature': 'B[P1{Landroid/app/Activity;onCreate(Landroid/os/Bundle;)V}P2P2F1SF1P2F1F0P1{Landroid/webkit/WebView;setVisibility(I)V}F0P1{Landroid/widget/ImageView;setVisibility(I)V}P0{Landroid/os/Handler;}P1{Landroid/os/Handler;<init>()V}P0P2P1{Landroid/os/Handler;postDelayed(Ljava/lang/Runnable; J)Z}F0P1{Landroid/webkit/WebView;getSettings()Landroid/webkit/WebSettings;}P1{Landroid/webkit/WebSettings;setJavaScriptEnabled(Z)V}F0F0P1{Landroid/webkit/WebView;loadUrl(Ljava/lang/String;)V}F0P0{Landroid/webkit/WebViewClient;}P1{Landroid/webkit/WebViewClient;<init>()V}P1{Landroid/webkit/WebView;setWebViewClient(Landroid/webkit/WebViewClient;)V}SSP1{Ljava/lang/String;equals(Ljava/lang/Object;)Z}I]B[F0P1{Landroid/webkit/WebView;getSettings()Landroid/webkit/WebSettings;}P1{Landroid/webkit/WebSettings;setSupportZoom(Z)V}F0P1{Landroid/webkit/WebView;getSettings()Landroid/webkit/WebSettings;}P1{Landroid/webkit/WebSettings;setBuiltInZoomControls(Z)V}]B[F0P1{Landroid/webkit/WebView;getSettings()Landroid/webkit/WebSettings;}P1{Landroid/webkit/WebSettings;setDatabaseEnabled(Z)V}F0P1{Landroid/webkit/WebView;getSettings()Landroid/webkit/WebSettings;}P1{Landroid/webkit/WebSettings;setDomStorageEnabled(Z)V}F0P1{Landroid/webkit/WebView;getSettings()Landroid/webkit/WebSettings;}P1{Landroid/webkit/WebSettings;setAppCacheEnabled(Z)V}F0P1{Landroid/webkit/WebView;getSettings()Landroid/webkit/WebSettings;}P0{Ljava/lang/StringBuilder;}P1{Ljava/lang/StringBuilder;<init>()V}SP1{Ljava/lang/StringBuilder;append(Ljava/lang/String;)Ljava/lang/StringBuilder;}P2P1{Ljava/lang/StringBuilder;append(Ljava/lang/String;)Ljava/lang/StringBuilder;}SP1{Ljava/lang/StringBuilder;append(Ljava/lang/String;)Ljava/lang/StringBuilder;}P1{Ljava/lang/StringBuilder;toString()Ljava/lang/String;}P1{Landroid/webkit/WebSettings;setAppCachePath(Ljava/lang/String;)V}F0P1{Landroid/webkit/WebView;getSettings()Landroid/webkit/WebSettings;}P1{Landroid/webkit/WebSettings;setAllowFileAccess(Z)V}F0P1{Landroid/webkit/WebView;getSettings()Landroid/webkit/WebSettings;}P1{Landroid/webkit/WebSettings;setSaveFormData(Z)V}P2F1SP2P1{Landroid/net/ConnectivityManager;getNetworkInfo(I)Landroid/net/NetworkInfo;}P1{Landroid/net/NetworkInfo;getState()Landroid/net/NetworkInfo$State;}F0I]B[P1{Landroid/net/ConnectivityManager;getNetworkInfo(I)Landroid/net/NetworkInfo;}P1{Landroid/net/NetworkInfo;getState()Landroid/net/NetworkInfo$State;}F0I]B[I]B[F0P1{Landroid/webkit/WebView;restoreState(Landroid/os/Bundle;)Landroid/webkit/WebBackForwardList;}]B[F0P0P2P1{Landroid/webkit/WebView;setWebChromeClient(Landroid/webkit/WebChromeClient;)V}F0P0P2P1{Landroid/webkit/WebView;setWebViewClient(Landroid/webkit/WebViewClient;)V}F0P0P2P1{Landroid/webkit/WebView;setDownloadListener(Landroid/webkit/DownloadListener;)V}R]B[P2SP1{Landroid/widget/Toast;makeText(Landroid/content/Context; Ljava/lang/CharSequence; I)Landroid/widget/Toast;}P1{Landroid/widget/Toast;show()V}G]', 'permissions_details': set([]), 'type': 'activity', 'permissions': 0}
<init> {'exceptions_entropy': 0, 'signature_entropy': 4.826946607093776, 'color': None, 'permissions_level': -1, 'hex_entropy': 3.7502926596166692, 'dynamic_code': 'false', 'java_api_entropy': 1.0, 'android_api_entropy': 4.578088307912703, 'signature': 'B[F1P1{Landroid/webkit/WebChromeClient;<init>()V}R]', 'permissions_details': set([]), 'type': 'normal', 'permissions': 0} AndroGuard 
onShowFileChooser {'exceptions_entropy': 4.011365041826379, 'signature_entropy': 4.796944117679478, 'color': None, 'permissions_level': -1, 'hex_entropy': 4.585472323235754, 'dynamic_code': 'false', 'java_api_entropy': 4.581300225304486, 'android_api_entropy': 4.6267571103207645, 'signature': 'B[F0P2I]B[F0P2P1{Landroid/webkit/ValueCallback;onReceiveValue(Ljava/lang/Object;)V}]B[F0P2P0{Landroid/content/Intent;}SP1{Landroid/content/Intent;<init>(Ljava/lang/String;)V}F0P2P1{Landroid/content/Context;getPackageManager()Landroid/content/pm/PackageManager;}P1{Landroid/content/Intent;resolveActivity(Landroid/content/pm/PackageManager;)Landroid/content/ComponentName;}I]B[P2]B[SF0P2P1{Landroid/content/Intent;putExtra(Ljava/lang/String; Ljava/lang/String;)Landroid/content/Intent;}]B[I]B[F0P0{Ljava/lang/StringBuilder;}P1{Ljava/lang/StringBuilder;<init>()V}SP1{Ljava/lang/StringBuilder;append(Ljava/lang/String;)Ljava/lang/StringBuilder;}P1{Ljava/io/File;getAbsolutePath()Ljava/lang/String;}P1{Ljava/lang/StringBuilder;append(Ljava/lang/String;)Ljava/lang/StringBuilder;}P1{Ljava/lang/StringBuilder;toString()Ljava/lang/String;}P2SP1{Landroid/net/Uri;fromFile(Ljava/io/File;)Landroid/net/Uri;}P1{Landroid/content/Intent;putExtra(Ljava/lang/String; Landroid/os/Parcelable;)Landroid/content/Intent;}]B[P0{Landroid/content/Intent;}SP1{Landroid/content/Intent;<init>(Ljava/lang/String;)V}SP1{Landroid/content/Intent;addCategory(Ljava/lang/String;)Landroid/content/Intent;}SP1{Landroid/content/Intent;setType(Ljava/lang/String;)Landroid/content/Intent;}I]B[]B[P0{Landroid/content/Intent;}SP1{Landroid/content/Intent;<init>(Ljava/lang/String;)V}SP1{Landroid/content/Intent;putExtra(Ljava/lang/String; Landroid/os/Parcelable;)Landroid/content/Intent;}SSP1{Landroid/content/Intent;putExtra(Ljava/lang/String; Ljava/lang/String;)Landroid/content/Intent;}SP1{Landroid/content/Intent;putExtra(Ljava/lang/String; [Landroid/os/Parcelable;)Landroid/content/Intent;}F0P2R]B[]B[P2SP1{Landroid/util/Log;e(Ljava/lang/String; Ljava/lang/String; Ljava/lang/Throwable;)I}G]B[G]B[G]B[G]', 'permissions_details': set([]), 'type': 'normal', 'permissions': 0}



0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?