{"id":1370,"date":"2018-05-24T07:37:14","date_gmt":"2018-05-24T02:07:14","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=1370"},"modified":"2018-05-24T07:37:14","modified_gmt":"2018-05-24T02:07:14","slug":"droid-hunter","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/droid-hunter\/","title":{"rendered":"Droid Hunter &#8211; Android Application Vulnerability Tool"},"content":{"rendered":"<p>Droid Hunter Android application vulnerability analysis and Android pentest tool.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1377\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/droidhunter.png\" alt=\"\" width=\"887\" height=\"614\" \/><\/p>\n<ul>\n<li>App info check<\/li>\n<li>Baksmaling android app<\/li>\n<li>Decompile android app<\/li>\n<li>Extract class file<\/li>\n<li>Extract java code<\/li>\n<li>Pattern base Information Leakage<\/li>\n<\/ul>\n<h4><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span>\u00a0<a href=\"https:\/\/kalilinuxtutorials.com\/ahmyth-android-rat\/\" target=\"_blank\" rel=\"noopener\">AhMyth Android Rat \u2013 Remote Administration Tool<\/a><\/strong><\/h4>\n<h2><span style=\"color: #008000;\"><strong>How to Install Droid Hunter?<\/strong><\/span><\/h2>\n<ul>\n<li><strong>Download(clone) &amp; Unpack DROID-HUNTER<\/strong><\/li>\n<\/ul>\n<pre><strong>git clone <a href=\"https:\/\/github.com\/hahwul\/droid-hunter.git\">https:\/\/github.com\/hahwul\/droid-hunter.git<\/a><\/strong>\n<strong>cd droid-hunter<\/strong><\/pre>\n<ul>\n<li><strong>Install Ruby GEM<\/strong><\/li>\n<\/ul>\n<pre><strong>gem install html-table<\/strong>\n<strong>gem install colorize<\/strong><\/pre>\n<ul>\n<li><strong>Set external tools<\/strong><\/li>\n<\/ul>\n<p><strong>Editing &#8220;.\/config\/config.rb&#8221;<\/strong><\/p>\n<pre><code><strong># Tool path\n$p_adb = \"\/usr\/bin\/adb\"     \n$p_aapt = \"\/usr\/bin\/aapt\"   # Path aapt\n                            # macOS &gt; (https:\/\/github.com\/hahwul\/droid-hunter\/issues\/12)\n$p_dex2jar = File.dirname(__FILE__)+\"\/..\/ex_tool\/dex2jar-0.0.9.15\/dex2jar.sh\"\n$p_apktool = File.dirname(__FILE__)+\"\/..\/ex_tool\/apktool\/apktool_2.3.1.jar\"\n$p_jad = File.dirname(__FILE__)+\"\/..\/ex_tool\/jad\/jad\"\n$p_grep = \"\/bin\/grep\"\n$p_unzip = \"\/usr\/bin\/unzip\"\n$p_sfilter = File.dirname(__FILE__)+\"\/..\/string_filter\"\n<\/strong><\/code><\/pre>\n<ul>\n<li>Run DROID-HUNTE<\/li>\n<\/ul>\n<pre><strong>ruby dhunter.rb<\/strong><\/pre>\n<h2><span style=\"color: #008000;\"><strong>How to Use?<\/strong><\/span><\/h2>\n<pre><code><strong>Usage: ruby dhunter.rb [APK]\nCommand\n-a, --apk : Analysis android APK file.\n + APK Analysis\n   =&gt; dhunter -a 123.apk[apk file]\n   =&gt; dhunter --apk 123.apk aaa.apk test.apk hwul.apk\n-p, --pentest : Penetration testing Device\n + Pentest Android\n   =&gt; dhunter -p device[device code]\n   =&gt; dhunter --pentest device\n-v, --version : Show this droid-hunter version\n-h, --help : Show help page<\/strong><\/code><\/pre>\n<h2><span style=\"color: #008000;\"><strong>TO-DO List<\/strong><\/span><\/h2>\n<p><strong>Add Vulnerability Scanning module<\/strong><br \/>\n<strong>Update string pattern<\/strong><br \/>\n<strong>Intent diagram<\/strong><\/p>\n<h2><span style=\"color: #008000;\"><strong>Screen shot<\/strong> <\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1372\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/new1.png\" alt=\"\" width=\"923\" height=\"344\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1373\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/new2.png\" alt=\"\" width=\"1418\" height=\"713\" \/><\/p>\n<p><a href=\"https:\/\/github.com\/hahwul\/droid-hunter\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-999\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" alt=\"\" width=\"141\" height=\"40\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Droid Hunter Android application vulnerability analysis and Android pentest tool. App info check Baksmaling android app Decompile android app Extract class file Extract java code Pattern base Information Leakage Also Read\u00a0AhMyth Android Rat \u2013 Remote Administration Tool How to Install Droid Hunter? Download(clone) &amp; Unpack DROID-HUNTER git clone https:\/\/github.com\/hahwul\/droid-hunter.git cd droid-hunter Install Ruby GEM gem [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[158,961,3568],"class_list":["post-1370","post","type-post","status-publish","format-standard","hentry","category-kali","tag-android-application","tag-droid-hunter","tag-vulnerability-tool"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Droid Hunter - Android Application Vulnerability Tool<\/title>\n<meta name=\"description\" content=\"Droid Hunter Android application vulnerability analysis and Android pentest tool. App info check Baksmaling android app Decompile android app Extract class file Extract java code Pattern base Information Leakage\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/droid-hunter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Droid Hunter - Android Application Vulnerability Tool\" \/>\n<meta property=\"og:description\" content=\"Droid Hunter Android application vulnerability analysis and Android pentest tool. App info check Baksmaling android app Decompile android app Extract class file Extract java code Pattern base Information Leakage\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/droid-hunter\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-24T02:07:14+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/droidhunter.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/droid-hunter\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/droid-hunter\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Droid Hunter &#8211; Android Application Vulnerability Tool\",\"datePublished\":\"2018-05-24T02:07:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/droid-hunter\/\"},\"wordCount\":83,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/droid-hunter\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/droidhunter.png\",\"keywords\":[\"Android Application\",\"Droid Hunter\",\"Vulnerability Tool\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/droid-hunter\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/droid-hunter\/\",\"name\":\"Droid Hunter - Android Application Vulnerability Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/droid-hunter\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/droid-hunter\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/droidhunter.png\",\"datePublished\":\"2018-05-24T02:07:14+00:00\",\"description\":\"Droid Hunter Android application vulnerability analysis and Android pentest tool. App info check Baksmaling android app Decompile android app Extract class file Extract java code Pattern base Information Leakage\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/droid-hunter\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/droid-hunter\/#primaryimage\",\"url\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/droidhunter.png\",\"contentUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/droidhunter.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Droid Hunter - Android Application Vulnerability Tool","description":"Droid Hunter Android application vulnerability analysis and Android pentest tool. App info check Baksmaling android app Decompile android app Extract class file Extract java code Pattern base Information Leakage","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/droid-hunter\/","og_locale":"en_US","og_type":"article","og_title":"Droid Hunter - Android Application Vulnerability Tool","og_description":"Droid Hunter Android application vulnerability analysis and Android pentest tool. App info check Baksmaling android app Decompile android app Extract class file Extract java code Pattern base Information Leakage","og_url":"https:\/\/kalilinuxtutorials.com\/droid-hunter\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-05-24T02:07:14+00:00","og_image":[{"url":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/droidhunter.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/droid-hunter\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/droid-hunter\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Droid Hunter &#8211; Android Application Vulnerability Tool","datePublished":"2018-05-24T02:07:14+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/droid-hunter\/"},"wordCount":83,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/droid-hunter\/#primaryimage"},"thumbnailUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/droidhunter.png","keywords":["Android Application","Droid Hunter","Vulnerability Tool"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/droid-hunter\/","url":"https:\/\/kalilinuxtutorials.com\/droid-hunter\/","name":"Droid Hunter - Android Application Vulnerability Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/droid-hunter\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/droid-hunter\/#primaryimage"},"thumbnailUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/droidhunter.png","datePublished":"2018-05-24T02:07:14+00:00","description":"Droid Hunter Android application vulnerability analysis and Android pentest tool. App info check Baksmaling android app Decompile android app Extract class file Extract java code Pattern base Information Leakage","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/droid-hunter\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/droid-hunter\/#primaryimage","url":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/droidhunter.png","contentUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/droidhunter.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":11749,"url":"https:\/\/kalilinuxtutorials.com\/awesome-android-security\/","url_meta":{"origin":1370,"position":0},"title":"Awesome Android Security","author":"R K","date":"November 4, 2020","format":false,"excerpt":"A curated list of Android Security materials and resources For Pentesters and Bug Hunters. Blog AAPG - Android application penetration testing guideTikTok: three persistent arbitrary code executions and one theft of arbitrary filesPersistent arbitrary code execution in Android's Google Play Core Library: details, explanation and the PoC - CVE-2020-8913Android: Access\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32837,"url":"https:\/\/kalilinuxtutorials.com\/broken-droid-factory\/","url_meta":{"origin":1370,"position":1},"title":"Broken Droid Factory : Crafting Vulnerable APKs For Pen Testing And Security Training","author":"Varshini","date":"April 24, 2024","format":false,"excerpt":"BDF is a Python tool designed to spin-up pseudo random vulnerable Android applications for vulnerability research, ethical hacking, and pen testing Android app practice. To get started, download the dependancies and run\u00a0BrokenDroidFactory.py, it's as simple as that! Create a pseudo random Android APK that contains an assortment of vulnerable and\u2026","rel":"","context":"In &quot;Android Security&quot;","block_context":{"text":"Android Security","link":"https:\/\/kalilinuxtutorials.com\/category\/android-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjqzoFYzb-oXcUSMSA8mUsJGxjHujkRtTpIBrCQsAj7mjUJSSfybennLtfGxsVCigIUiBziavS8eiVx302jGPU7JztPaKlnbVl18g_CvxdAwfDdf9YfjBFIqmLbyHLPpuoqwJlUtLIrgyKiDT9pp44HkYNVpjni32Qr0xAGYFux5dpxG8d6jTJRIda4IyOj\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%286%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjqzoFYzb-oXcUSMSA8mUsJGxjHujkRtTpIBrCQsAj7mjUJSSfybennLtfGxsVCigIUiBziavS8eiVx302jGPU7JztPaKlnbVl18g_CvxdAwfDdf9YfjBFIqmLbyHLPpuoqwJlUtLIrgyKiDT9pp44HkYNVpjni32Qr0xAGYFux5dpxG8d6jTJRIda4IyOj\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%286%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjqzoFYzb-oXcUSMSA8mUsJGxjHujkRtTpIBrCQsAj7mjUJSSfybennLtfGxsVCigIUiBziavS8eiVx302jGPU7JztPaKlnbVl18g_CvxdAwfDdf9YfjBFIqmLbyHLPpuoqwJlUtLIrgyKiDT9pp44HkYNVpjni32Qr0xAGYFux5dpxG8d6jTJRIda4IyOj\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%286%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjqzoFYzb-oXcUSMSA8mUsJGxjHujkRtTpIBrCQsAj7mjUJSSfybennLtfGxsVCigIUiBziavS8eiVx302jGPU7JztPaKlnbVl18g_CvxdAwfDdf9YfjBFIqmLbyHLPpuoqwJlUtLIrgyKiDT9pp44HkYNVpjni32Qr0xAGYFux5dpxG8d6jTJRIda4IyOj\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%286%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjqzoFYzb-oXcUSMSA8mUsJGxjHujkRtTpIBrCQsAj7mjUJSSfybennLtfGxsVCigIUiBziavS8eiVx302jGPU7JztPaKlnbVl18g_CvxdAwfDdf9YfjBFIqmLbyHLPpuoqwJlUtLIrgyKiDT9pp44HkYNVpjni32Qr0xAGYFux5dpxG8d6jTJRIda4IyOj\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%286%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjqzoFYzb-oXcUSMSA8mUsJGxjHujkRtTpIBrCQsAj7mjUJSSfybennLtfGxsVCigIUiBziavS8eiVx302jGPU7JztPaKlnbVl18g_CvxdAwfDdf9YfjBFIqmLbyHLPpuoqwJlUtLIrgyKiDT9pp44HkYNVpjni32Qr0xAGYFux5dpxG8d6jTJRIda4IyOj\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%286%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1967,"url":"https:\/\/kalilinuxtutorials.com\/cuckoodroid-android-malware\/","url_meta":{"origin":1370,"position":2},"title":"CuckooDroid &#8211; Automated Android Malware Analysis with Cuckoo Sandbox","author":"R K","date":"July 18, 2018","format":false,"excerpt":"CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files, CuckooDroid brigs to cuckoo the capabilities of execution and analysis of android application. Contributed By Check Point Software Technologies LTD. Also Read\u00a0Rootless Jailbreakd \u2013 Jailbreakd Offering Some More Functionality To The Jailbreak CuckooDroid\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1381,"url":"https:\/\/kalilinuxtutorials.com\/two-step-authentication\/","url_meta":{"origin":1370,"position":3},"title":"Mozilla Adds Two Step Authentication Support For Firefox Accounts","author":"R K","date":"May 24, 2018","format":false,"excerpt":"Mozilla is propelling a Two Step Authentication process for supporting Firefox accounts. The authentication framework utilizes Firefox Sync usefulness to secure the synchronization of bookmarks, passwords, open labels, and other data between devices. As per Mozilla build Vijay Budhram, this component is continuously being elevated to clients and it did\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":32288,"url":"https:\/\/kalilinuxtutorials.com\/android-security-awesome\/","url_meta":{"origin":1370,"position":4},"title":"Android Security Awesome : Securing the Android Ecosystem &#8211; A Comprehensive Resource Guide","author":"Varshini","date":"March 12, 2024","format":false,"excerpt":"In the ever-evolving landscape of mobile technology, Android security remains a paramount concern for developers, researchers, and users alike. 'Android Security Awesome' is a comprehensive guide that aggregates an array of tools, academic resources, publications, and insights into exploits, vulnerabilities, and bugs within the Android ecosystem. This collection aims to\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglosJOinQNBiPwfkA1zF2yze2WRUcQdBZE0QrLklZ_TfqPXO7XbVeDeyzFPdXZfhsOgHOqMAddvdH4M9faZEJ38nMhfQioDNHVOfhiPkq-q0Ixx8TL5Reaf0WR4W8upr_qxH4x-NnZ9BWf6cKeebhyNh5xNzEMfeNGrARz_6kS4cL1jBAym2C6pnSwmfsR\/s16000\/Android%20Security%20Awesome.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglosJOinQNBiPwfkA1zF2yze2WRUcQdBZE0QrLklZ_TfqPXO7XbVeDeyzFPdXZfhsOgHOqMAddvdH4M9faZEJ38nMhfQioDNHVOfhiPkq-q0Ixx8TL5Reaf0WR4W8upr_qxH4x-NnZ9BWf6cKeebhyNh5xNzEMfeNGrARz_6kS4cL1jBAym2C6pnSwmfsR\/s16000\/Android%20Security%20Awesome.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglosJOinQNBiPwfkA1zF2yze2WRUcQdBZE0QrLklZ_TfqPXO7XbVeDeyzFPdXZfhsOgHOqMAddvdH4M9faZEJ38nMhfQioDNHVOfhiPkq-q0Ixx8TL5Reaf0WR4W8upr_qxH4x-NnZ9BWf6cKeebhyNh5xNzEMfeNGrARz_6kS4cL1jBAym2C6pnSwmfsR\/s16000\/Android%20Security%20Awesome.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglosJOinQNBiPwfkA1zF2yze2WRUcQdBZE0QrLklZ_TfqPXO7XbVeDeyzFPdXZfhsOgHOqMAddvdH4M9faZEJ38nMhfQioDNHVOfhiPkq-q0Ixx8TL5Reaf0WR4W8upr_qxH4x-NnZ9BWf6cKeebhyNh5xNzEMfeNGrARz_6kS4cL1jBAym2C6pnSwmfsR\/s16000\/Android%20Security%20Awesome.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglosJOinQNBiPwfkA1zF2yze2WRUcQdBZE0QrLklZ_TfqPXO7XbVeDeyzFPdXZfhsOgHOqMAddvdH4M9faZEJ38nMhfQioDNHVOfhiPkq-q0Ixx8TL5Reaf0WR4W8upr_qxH4x-NnZ9BWf6cKeebhyNh5xNzEMfeNGrARz_6kS4cL1jBAym2C6pnSwmfsR\/s16000\/Android%20Security%20Awesome.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglosJOinQNBiPwfkA1zF2yze2WRUcQdBZE0QrLklZ_TfqPXO7XbVeDeyzFPdXZfhsOgHOqMAddvdH4M9faZEJ38nMhfQioDNHVOfhiPkq-q0Ixx8TL5Reaf0WR4W8upr_qxH4x-NnZ9BWf6cKeebhyNh5xNzEMfeNGrARz_6kS4cL1jBAym2C6pnSwmfsR\/s16000\/Android%20Security%20Awesome.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":25712,"url":"https:\/\/kalilinuxtutorials.com\/droiddetective\/","url_meta":{"origin":1370,"position":5},"title":"DroidDetective : A Machine Learning Malware Analysis Framework For Android Apps","author":"R K","date":"June 30, 2022","format":false,"excerpt":"DroidDetective is a Python tool for analysing Android applications (APKs) for potential malware related behaviour and configurations. When provided with a path to an application (APK file) Droid Detective will make a prediction (using it's ML model) of if the application is malicious. Features and qualities of Droid Detective include:\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEieaRUZ54n1eSReZr-5WnswlA-4mebuR5y3cgiuDKLxxKOiOTCyqazaqgLIAKSrXdCMWcuEY6c1dail0wnV5DvfbU1NJUOIocO16T4UmEHL-Lxe3SrPLZp9LgyPhwsjYaPlSVK5HfgVl0DhL_rvcH5o5S91mIj9okPFpBjMcNP-CcZAVnJ6EA5-I02p\/s728\/cover%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEieaRUZ54n1eSReZr-5WnswlA-4mebuR5y3cgiuDKLxxKOiOTCyqazaqgLIAKSrXdCMWcuEY6c1dail0wnV5DvfbU1NJUOIocO16T4UmEHL-Lxe3SrPLZp9LgyPhwsjYaPlSVK5HfgVl0DhL_rvcH5o5S91mIj9okPFpBjMcNP-CcZAVnJ6EA5-I02p\/s728\/cover%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEieaRUZ54n1eSReZr-5WnswlA-4mebuR5y3cgiuDKLxxKOiOTCyqazaqgLIAKSrXdCMWcuEY6c1dail0wnV5DvfbU1NJUOIocO16T4UmEHL-Lxe3SrPLZp9LgyPhwsjYaPlSVK5HfgVl0DhL_rvcH5o5S91mIj9okPFpBjMcNP-CcZAVnJ6EA5-I02p\/s728\/cover%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEieaRUZ54n1eSReZr-5WnswlA-4mebuR5y3cgiuDKLxxKOiOTCyqazaqgLIAKSrXdCMWcuEY6c1dail0wnV5DvfbU1NJUOIocO16T4UmEHL-Lxe3SrPLZp9LgyPhwsjYaPlSVK5HfgVl0DhL_rvcH5o5S91mIj9okPFpBjMcNP-CcZAVnJ6EA5-I02p\/s728\/cover%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/1370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=1370"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/1370\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=1370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=1370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=1370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}