An open-source toolkit for automated dynamic analysis of Android applications by intercepting and modifying API calls.
Hooker is an open-source toolkit for dynamic analysis of Android applications. It automatically intercepts and modifies API calls made by targeted apps to capture contextual data like parameters and return values. This helps in understanding application behavior and identifying security vulnerabilities.
Security researchers, penetration testers, and developers focused on Android application security and behavior analysis.
Hooker provides an automated, extensible framework for dynamic analysis using the Android Substrate framework, with integrated tools for data storage and visualization, making it a comprehensive solution for API-level interception and analysis.
Hooker is an opensource project for dynamic analyses of Android applications. This project provides various tools and applications that can be use to automaticaly intercept and modify any API calls made by a targeted application.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Leverages Android Substrate to automatically intercept and modify API calls, capturing parameters and return values for dynamic analysis, as described in the functional description.
Stores collected data directly in ElasticSearch or JSON files and includes a Kibana dashboard example for visualization, enabling seamless analysis workflows.
Provides Python scripts for automating analysis on multiple apps, emulator management tools, and APK retrieval utilities, covering end-to-end dynamic analysis needs.
Includes scripts like emulatorCreator to set up Android Virtual Devices with specific configurations, simplifying the testing environment preparation.
Only supports Android 4.1 and 4.2 due to dependency on the Substrate framework, making it irrelevant for analyzing modern applications.
Requires a Debian 64-bit system, specific versions of Python 2.7, ElasticSearch 1.7, and manual steps like socat configuration, as noted in the Getting Started section.
Admitted as a proof-of-concept in the disclaimer, implying potential bugs, lack of updates, and reliance on the unmaintained Substrate framework.
While possible, using Hooker on real devices requires additional configuration and a separate README, indicating it's primarily optimized for emulators.