A high-performance static analysis utility designed to automate the discovery of attack surfaces in Android applications. By parsing decompiled AndroidManifest.xml files, this tool identifies exposed components, security misconfigurations, and deep-link vectors, providing ready-to-use adb payloads for immediate dynamic verification.
- Attack Surface Mapping: Identify all exported Activities, Services, Broadcast Receivers, and Content Providers.
- Implicit Export Detection: Flag components that are exported by default due to the presence of intent-filters without explicit
android:exported="false"attributes. - Deep Link Analysis: Extract URI schemes and hosts to facilitate intent-fuzzing and unauthorized navigation testing.
- Permission Audit: Highlight unprotected components and evaluate the strength of defined custom permissions.
- Config Analysis: Detect high-risk flags such as
debuggable="true",allowBackup="true", andtestOnly="true".
- Python 3.6+
- apktool (for decompiling binary XML)
- Clone the repository and install the dependencies:
$: git clone https://github.com/mateofumis/AndroidManifestExplorer.git
$: cd AndroidManifestExplorer
$: pip install .- Alternatively, install the requirements directly:
$: pip install -r requirements.txt- Using PyPI (Available for
piporpipx)
# with pip/pip3
$: pip install AndroidManifestExplorer
# or pipx
$: pipx install AndroidManifestExplorerThe tool operates on the plain-text XML output of apktool.
$: apktool d target_app.apk -o output_dirRun the explorer against the generated manifest:
$: AndroidManifestExplorer -f output_dir/AndroidManifest.xmlIf running the script directly without installation:
$: python3 AndroidManifestExplorer.py -f output_dir/AndroidManifest.xmlThe tool categorizes findings by risk and generates specific adb commands:
- Activities: Generates
am startcommands. - Services: Generates
am start-servicecommands. - Receivers: Generates
am broadcastcommands. - Providers: Generates
content querycommands with a default SQLi test payload (--where "1=1").
[+] ACTIVITY EXPORTED: com.package.name.InternalActivity
[!] NO PERMISSION REQUIRED (High Risk)
[>] ADB: adb shell am start -n com.package.name/com.package.name.InternalActivity
[★] DEEP LINK DETECTED: secret-app://debug_panel
[>] Attack: adb shell am start -W -a android.intent.action.VIEW -d "secret-app://debug_panel" com.package.name
This tool is intended for professional security research and authorized penetration testing only. Unauthorized use against systems without prior written consent is strictly prohibited and may violate local and international laws. The developer assumes no liability for misuse or damage caused by this utility.
