SATH Scanner is a tool designed to scan Android packages for suspicious permissions and check for potentially malicious applications using VirusTotal.
- Installation
- Usage
- Functions Description
- Contributing
- License
- Clone this repository to your local machine.
git clone https://github.com/Im0nk3yar0und/SATH_Scanner.git
- Ensure you have
adb
(Android Debug Bridge) installed on your computer.
- Connect your Android device to your computer.
- Ensure USB debugging is enabled on your Android device.
- Run the script using the following command:
./sath_scanner.sh
-
This function scans all installed applications on the connected Android device for potentially suspicious permissions that are commonly associated with malware. It specifically checks for permissions such as INTERNET, CAMERA, READ_SMS, READ_CONTACTS, READ_CALL_LOG, READ_EXTERNAL_STORAGE, and RECORD_AUDIO. If any application requests all of these permissions, it triggers a more thorough scan to identify possible malware.
-
This Bash script checks for the presence of a file containing a VirusTotal API key. If the file exists, it reads the key from it. If not, it prompts the user to input the API key and saves it to the file
~/.virustotal_api_key
.
- This function lists all packages installed on the connected Android device.
- This function retrieves information about the connected Android device, including the device model, Android version, and more.
- This function retrieves the APK files of installed applications from the connected Android device to the local machine and then calculates the MD5 checksum for each application.
- This function retrieves the permissions requested by each installed application on the Android device.
- This function effectively monitors processes on the Android device in real-time and logs any changes to the pspy.log file. Users can terminate the monitoring process by pressing any key.
- This function provides real-time system resource usage and process activity using the 'top' command on the connected Android device.
- This function lists the top 30 processes by memory usage on the connected Android device.
- This function checks the MD5 hash of a specific package against VirusTotal's API to detect potentially malicious applications.
- Contributions are welcome! Feel free to open an issue or submit a pull request.
- This project is licensed under the MIT License. See the LICENSE file for details.