Skip to content

πŸ¦β€πŸ”₯ Android Service Attack Surface Analyzer - Automated reconnaissance and attack command generation

License

Notifications You must be signed in to change notification settings

falcon0x1/FalconServiceAnalyzer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

FalconServiceAnalyzer

╔═══════════════════════════════════════════════════════════╗
β•‘  π“…ˆ 𓆲 π“…‰ π“…‚ π“…† π“…‡ 𖀍 𓆲 π“…“ πŸ¦β€πŸ”₯ π“…ƒ                           β•‘
β•‘     π•—π•’π•π•”π• π•ŸπŸ˜π•©πŸ™                                             β•‘
β•‘     0xDEADBEEF β€’ RED TEAM β€’ PHOENIX OPS                   β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

Android Service Attack Surface Analyzer
Automated reconnaissance and attack command generation for Android services

𖀍 Overview

FalconServiceAnalyzer is an offensive security tool that automates the discovery and analysis of Android service attack surfaces. It goes beyond simple enumeration by generating ready-to-use attack commands and providing actionable intelligence for penetration testing.

πŸ¦β€πŸ”₯ Key Features

  • Intelligent Service Classification

    • Detects: Started, Bound, Hybrid, AIDL, Messenger services
    • Identifies exported vs non-exported services
    • Obfuscation detection
  • Attack Command Generation

    • Started services: Ready ADB commands
    • Bound services: PoC/Frida guidance (no fake exploits)
    • Permission requirement detection
  • Static Analysis

    • Smali code inspection
    • Runtime.exec detection
    • Intent extras handling analysis
    • Exported service enumeration
  • Dual Input Modes

    • APK files (automatic decompilation)
    • Pre-decompiled folders (fast mode)
  • Rich Reporting

    • Interactive HTML reports with dark theme
    • Structured JSON output
    • Attack surface statistics

π“…‰ Installation

Prerequisites

# Debian/Ubuntu
sudo apt install apktool python3 jq

# Arch Linux
sudo pacman -S apktool python jq

Setup

git clone https://github.com/falcon0x1/FalconServiceAnalyzer.git
cd FalconServiceAnalyzer
chmod +x falcon_service_analyzer.sh

π“…‡ Usage

Basic Analysis

# Analyze APK (will decompile)
./falcon_service_analyzer.sh target.apk

# Fast mode with pre-decompiled folder
./falcon_service_analyzer.sh /path/to/decompiled_app/

# With Jadx support
./falcon_service_analyzer.sh -j target.apk

Output Structure

analysis_<app_name>_<timestamp>/
β”œβ”€β”€ source/              # Decompiled APK
└── reports/
    β”œβ”€β”€ json/
    β”‚   β”œβ”€β”€ service_1.json
    β”‚   └── final_report.json
    β”œβ”€β”€ html/
    β”‚   └── index.html   # Interactive report
    └── attack_scripts/  # Generated PoC templates

𓆲 Attack Methodology

Started Services

When a service implements onStartCommand, it can be triggered directly:

adb shell am start-service -n com.example.app/.VulnerableService

FalconServiceAnalyzer automatically generates these commands for discovered started services.

Bound Services

Bound services require client-side implementation. The tool:

  • Identifies the binding mechanism (AIDL/Messenger)
  • Provides guidance for PoC development
  • Does NOT suggest fake ADB exploits

Hybrid Services

Services implementing both patterns get ADB commands for the started interface, plus notes about the bound interface.

𖀍 Example Output

[π“…‰] Service #1: com.example.app.AuthService
    [π“…‚] Exported: true
    [𖀍] Type: started
    [πŸ¦β€πŸ”₯] Attack: adb shell am start-service -n com.example.app/.AuthService
    [π“…‚] Findings: 2 potential issue(s)

π“…† Use Cases

  • Bug Bounty: Rapid service attack surface enumeration
  • Penetration Testing: Automated reconnaissance phase
  • Security Research: Service behavior analysis
  • CTF: Quick service vulnerability identification

π“…‚ Legal Notice

For authorized security testing only.

This tool is intended for:

  • Applications you own
  • Authorized penetration testing engagements
  • Security research with proper permissions
  • Educational purposes in controlled environments

Unauthorized testing of applications is illegal. You are solely responsible for compliance with applicable laws and regulations.

π“…‡ Contributing

Contributions welcome! Areas of interest:

  • Additional vulnerability detection patterns
  • Frida script generation
  • AIDL interface parsing
  • Custom PoC templates

𓆲 Credits

Made by falcon0x1

  • GitHub: @falcon0x1
  • Focus: Offensive Security β€’ Android β€’ Web β€’ AD
π“…ˆ 𓆲 π“…‰ π“…‚ π“…† π“…‡ 𖀍 𓆲 π“…“ πŸ¦β€πŸ”₯ π“…ƒ

𖀍 License

MIT License - See LICENSE file for details


Part of the falcon0x1 offensive security toolkit

About

πŸ¦β€πŸ”₯ Android Service Attack Surface Analyzer - Automated reconnaissance and attack command generation

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages