/Apk_Analysis

Developed a Mobile Application Vulnerability Scanner using the MAVS-master tool in Python. Enhanced the tool for bash scanning, enabling efficient processing of over 80 APK files from various domains. Conducted static analysis to identify security vulnerabilities, generating detailed CSV reports and graphical representations for better insights

Primary LanguageShell

Apk_Analysis

Compatibility:

This code is primarily designed to run on Linux. MAVS-master is not compatible with Windows. For Windows users, consider using an alternative APK analyzer tool.

Installation:

  1. cd path/to/Desktop
  2. git clone https://github.com/harshitSingh1/Apk_Analysis.git
  3. [extract All the files from zip]
  4. cd Apk_Analysis
  5. Scanning APKs: a) chmod 777 scan_apks.py b) python3 scan_apks.py
  6. Analyzing Results: a) chmod 777 graph.py b) python3 graph.py

Folder Structure:

  1. Apk_files: Contains APK files to be scanned.
  2. mavs_master: MAVS tool for scanning APK files.
  3. scanning_results.csv: CSV file containing the scanning results.(you may delete this before you start scanning)
  4. scan_apks.py: Python script for scanning APK files.
  5. graph.py: Python script for analyzing and visualizing the scanning results.

Result:

1. Output while scanning the files:

Screenshot (560)

2. CSV file data after scanning:

Screenshot (561)

3. Bar chart: Number of APK files vs each vulnerability

Screenshot (562)

4. Stacked bar chart: Number of APK files with each vulnerability

Screenshot (563)

5. Pie chart: Percentage of each vulnerability

Screenshot (564)

6. line chart: Apk files vs No. of vulnerabilities

Screenshot (565)