Bugbane
On-device Android forensics tookit
Install / Use
/learn @osservatorionessuno/BugbaneREADME
Bugbane
<img width="100" alt="image" src="https://raw.githubusercontent.com/osservatorionessuno/bugbane/refs/heads/main/icons/ic_bugbane_zoom.svg" />[!CAUTION] This project is under active development and is not recommended for non-technical users at this stage. The installation and usage of Bugbane can be detected by spyware and stalkerware. Do not use it when there is a direct risk of physical harm.
Bugbane is an open-source Android application designed to help potential spyware and stalkerware victims self-triage their own device and, when appropriate, export evidence for later analysis by trusted organizations. Read more and see the demo in our blog post (Italian version).
<img width="260" alt="image" src="https://raw.githubusercontent.com/osservatorionessuno/bugbane/refs/heads/main/fastlane/metadata/android/en-US/images/phoneScreenshots/4.png" /> <img width="260" alt="image" src="https://raw.githubusercontent.com/osservatorionessuno/bugbane/refs/heads/main/fastlane/metadata/android/en-US/images/phoneScreenshots/9.png" /> <img width="260" alt="image" src="https://raw.githubusercontent.com/osservatorionessuno/bugbane/refs/heads/main/fastlane/metadata/android/en-US/images/phoneScreenshots/7.png" />
Unlike existing tools such as MVT, Bugbane does not require a separate computer, command-line usage, or debugging skills. It uses ADB Wireless Debugging to issue commands directly to the same device on which it is installed, through a guided, user-friendly interface.
Exports are intended to be AndroidQF-compliant, making them portable and analyzable off-device using existing tools, and can be easily shared via Signal or other communication tools. Each export is automatically encrypted with a random password using age. Since exported data can contain sensitive personal information, the initial scan is performed on-device using a re-implementation of MVT that reuses the same IOCs as the original.
This project is still evolving. A beta release will be announced when ready, and testing will be opened at that stage.
License
Portions of the code in Shizuku are distributed under the Apache 2.0 License, whereas Bugbane is released under the GNU General Public License, Version 3 (GPLv3).
Technical details
Bugbane uses the pairing logic from Shizuku, forked and included in our code, and libadb-android as a dependency. This allows it to interact with the device's debugging service exactly as a computer connected via USB would.
- Commands are executed with shell privileges.
- Output is saved to the application’s private storage and encrypted.
- The generated ADB RSA certificate is authorized for debugging and stored encrypted at rest, using StrongBox-backed credentials when available.
Export and sharing logic are currently in progress. Documentation will be expanded as development continues.
Project Structure
Bugbane is divided in 4 main coponents:
- the Bugbane UI components and activities (
org.osservatorionessuno.bugbane.*) - cabd, a Kotlin implementation of a minimal ADB client (
org.osservatorionessuno.cadb.*) - QF, a Kotlin implementation of AndroidQF acquisition modules (
org.osservatorionessuno.qf.*). Its main entrypoint is theAcquisitionRunnerclass. - LibMVT, a Java implementation of MVT IOC analysis engine (
org.osservatorionessuno.libmvt.*). Its main entrypoint is theForeniscRunnerclass.
Related Skills
node-connect
345.4kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
104.6kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
345.4kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
345.4kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
