cuckoo-droid | Automated Android Malware Analysis with Cuckoo Sandbox | Reverse Engineering library
kandi X-RAY | cuckoo-droid Summary
kandi X-RAY | cuckoo-droid Summary
CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Start the analysis
- Get the parsed options
- Prepare the configuration
- Checks if the environment is ready
- Configure the network
- Create a new method
- List tasks
- Force a value into an integer
- Return epoch timestamp
- Run the APK
- Run the ADB
- Make the application
- Class decorator
- Configure the content provider
- Make telemetry services
- Make a file system
- Generate HTML report
- Returns the signature for the given analysis method
- Creates media
- Run the Ryumon log file
- Initialize the crypto
- Take a screenshot
- Get the size of the given sequence
- Creates a binder
- Provide location manager
- Add a malware to the system
cuckoo-droid Key Features
cuckoo-droid Examples and Code Snippets
Community Discussions
Trending Discussions on cuckoo-droid
QUESTION
So I am trying to root an emulator, My ultimate goal is to change the phone properties like device name, manufacturer/brand name, imei number etc. (modify build.prop) I have tried rooting using this method.
https://github.com/0xFireball/root_avd/blob/master/README.md
The root works fine, I am able to root and make changes to the build but when I try to restart it, the emulator gets stuck in the boot loop
https://github.com/idanr1986/cuckoo-droid/issues/4
and this answer https://android.stackexchange.com/questions/180468/android-emulator-how-to-avoid-boot-loop-after-rooting
Through which I realized that replacing the su file might fix the issue. I replaced it and I am able to reboot but when I do, the root is gone and the changes don't stick.
I am using x86 non gplay api version 25 Any help will be greatly appreciated
...ANSWER
Answered 2019-Sep-26 at 15:09Instead of rooting the emulator to change these properties. I extracted the system.img using Superr Kitchen tool.
Then deodexed the full ram. Extract the jar file(in this case framework.jar it contains telephony manager which has function for device imei) After that edited the smali files to return the desired value when device imei is called( alternatively you can edit the java file and convert it into smali) And then build it all back into the system.img using Superr Kitchen
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install cuckoo-droid
You can use cuckoo-droid like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page