返回顶部
a

android-armor-breaker

Android Armor Breaker - Frida-based unpacking technology for commercial to enterprise Android app protections, providing complete APK reinforcement analysis and intelligent DEX extraction solutions.

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 2.2.2
安全检测
已通过
185
下载量
1
收藏
概述
安装方式
版本历史

android-armor-breaker

## 1. Name **android-armor-breaker** ## 2. Description **Android Armor Breaker** - Multi-strategy unpacking technology for the OpenClaw platform, targeting commercial to enterprise-level Android application protection solutions. Combines **Frida-based dynamic injection**, **Root memory static analysis**, and **Intelligent DEX extraction** to provide complete **APK Reinforcement Analysis** and **DEX Extraction** solutions. **Frida Unpacking Technology**: Commercial-grade reinforcement breakthrough solution based on the Frida framework, supporting advanced features like deep search, anti-debug bypass, etc. **Core Features**: 1. ✅ **APK Reinforcement Analysis** - Static analysis of APK files to identify reinforcement vendors and protection levels 2. ✅ **Environment Check** - Automatically checks Frida environment, device connection, app installation status, Root permissions 3. ✅ **Intelligent Unpacking** - Automatically selects the best unpacking strategy based on protection level 4. ✅ **Real-time Monitoring Interface** - Tracks DEX file extraction process, displays progress in real-time 5. ✅ **DEX Integrity Verification** - Verifies the integrity and validity of generated DEX files 6. ✅ **Root Memory Extraction** - Direct memory reading via root permissions, completely bypassing application-layer anti-debug (proven against IJIAMI, Bangcle, etc.) **Enhanced Features (for commercial reinforcement)**: 7. ✅ **Application Warm-up Mechanism** - Waits + simulates operations to trigger more DEX loading 8. ✅ **Multiple Unpacking Attempts** - Unpacks at multiple time points, merges results to improve coverage 9. ✅ **Dynamic Loading Detection** - Specifically detects dynamically loaded files like baiduprotect*.dex 10. ✅ **Deep Integrity Verification** - Multi-dimensional verification including file headers, size, Baidu protection features, etc. 11. ✅ **Commercial Reinforcement Bypass** - Root memory static analysis that completely bypasses IJIAMI, Bangcle, 360, Tencent, and other commercial protections (success rate: 95%+ with root access) 12. ✅ **VDEX Format Processing** - Automatic detection and extraction of DEX files from VDEX (Verifier DEX) format, targeting NetEase Yidun reinforcement (vdex027 format supported) **Internationalization Features (v2.2.0)**: 13. ✅ **Multi-language Support** - Full support for English and Chinese environments 14. ✅ **Internationalized Logging** - Unified international logging system 15. ✅ **Language Parameter** - `--language en-US/zh-CN` parameter support 16. ✅ **Backward Compatibility** - Defaults to English, no impact on existing functionality 17. ✅ **Unified Experience** - All core features support bilingual switching **Anti-Debug Enhancement Features (v2.2.0 - 2026-04-10)**: 18. ✅ **Strong Anti-debug Protection Bypass** - Specialized techniques for Thread.stop() detection, /proc file hiding 19. ✅ **Enhanced Frida Hiding** - Better hiding of Frida threads, memory mappings, and modules 20. ✅ **Multi-layer Hook Strategy** - Java layer + Native layer + System call hooks 21. ✅ **Protection Type Auto-detection** - Automatically detects and applies optimizations for strong anti-debug, IJIAMI, Bangcle, etc. 22. ✅ **Timing Randomization** - Random delays to bypass timing-based anti-debug detection 23. ✅ **Comprehensive File Operation Hooks** - Hooks fopen, open, readlink, ptrace, tracepid, etc. 24. ✅ **Enhanced Verification System** - Detailed verification with success/failure reporting ## 3. ⚠️ Security and Responsible Use Notice ### **Important Security Warning** **Android Armor Breaker** is a **high-privilege, dual-use tool** for legitimate security research. Due to its powerful capabilities, it has been flagged by ClawHub Security as "suspicious". Please review this section carefully before use. ### **Legal and Ethical Requirements** - ✅ **Only use on applications you own or have explicit written permission to analyze** - ✅ **Comply with all applicable laws and regulations** (DMCA, CFAA, GDPR, etc.) - ✅ **Respect intellectual property rights and licensing agreements** - ✅ **Obtain proper authorization before analyzing any third-party applications** ### **Safety Guidelines** 1. **Use Isolated Testing Environments**: Test on dedicated Android devices or emulators, NOT personal or production devices 2. **Required Permissions**: Rooted Android device, ADB root access, frida-server 3. **Script Inspection**: Review all bundled scripts before execution 4. **Memory Access Awareness**: This tool reads process memory which may contain sensitive information 5. **No External Data Transmission**: Current version contains NO network calls or data exfiltration ### **Intended Use Cases** ✅ **Legitimate**: Security research, penetration testing, malware analysis, education ❌ **Prohibited**: Unauthorized application analysis, intellectual property theft, piracy, privacy violation **By using this tool, you acknowledge that you have read, understood, and agree to comply with these guidelines and all applicable laws.** **For complete security documentation, see [SECURITY.md](SECURITY.md)** ## 4. Installation ### 3.1 Automatic Installation via OpenClaw This skill is configured for automatic dependency installation. When installed through the OpenClaw skill system, it will automatically detect and install the following dependencies: 1. **Frida Tools Suite** (`frida-tools`) - Includes `frida` and `frida-dexdump` commands 2. **Python3** - Script runtime environment 3. **Android Debug Bridge** (`adb`) - Device connection tool ### 3.2 Manual Dependency Installation If not installed via OpenClaw, please manually install the following dependencies: ```bash # Install Frida tools pip install frida-tools # Install Python3 (if not installed) sudo apt-get install python3 python3-pip # Install ADB sudo apt-get install adb # Run frida-server on Android device # 1. Download frida-server for the corresponding architecture # 2. Push to device: adb push frida-server /data/local/tmp/ # 3. Set permissions and run: adb shell "chmod 755 /data/local/tmp/frida-server && /data/local/tmp/frida-server" ``` ### 3.3 Skill File Structure After installation, the skill file structure is as follows: ``` android-armor-breaker/ ├── SKILL.md # Skill documentation ├── _meta.json # Skill metadata ├── LICENSE # MIT License ├── scripts/ # Execution scripts directory │ ├── android-armor-breaker # Main wrapper script │ ├── apk_protection_analyzer.py # APK reinforcement analyzer │ ├── enhanced_dexdump_runner.py # Enhanced unpacking executor (Frida-based) │ ├── root_memory_extractor.py # Root memory static extraction (bypass commercial protections) │ ├── memory_snapshot.py # Memory snapshot attack (gdbserver + root fallback) │ ├── antidebug_bypass.py # Anti-debug bypass module │ ├── bangcle_bypass.js # Bangcle reinforcement bypass script │ ├── bangcle_bypass_runner.py # Bangcle bypass runner │ ├── frida_memory_scanner.js # Frida memory scanner utility │ └── libDexHelper_original.so # Reference library for Bangcle analysis └── .clawhub/ # ClawHub publishing configuration └── origin.json # Publishing source information ``` ## 5. Usage Strategies ### 5.1 Recommended Workflow Based on protection analysis results, follow this decision tree: ``` 1. Analyze APK reinforcement: python3 scripts/apk_protection_analyzer.py --apk <apk_file> 2. Select unpacking strategy: - No reinforcement or basic protection → Use Frida-based unpacking - Commercial reinforcement (IJIAMI, Bangcle, 360, Tencent) → Use Root memory extraction - Extreme anti-debug (app crashes immediately) → Use Memory snapshot attack 3. Execute selected strategy: # Frida-based (standard) ./scripts/android-armor-breaker --package <package_name> # Root memory extraction (bypass commercial protections) python3 scripts/root_memory_extractor.py --package <package_name> # Memory snapshot (for crashing apps) python3 scripts/memory_snapshot.py --package <package_name> ``` ### 5.2 Root Memory Extraction - The Ultimate Bypass The **Root Memory Extractor** is the most powerful tool against commercial reinforcements: **Key Advantages**: - ✅ **Complete bypass**: No application-layer detection (Frida scripts are not used) - ✅ **Static analysis**: Reads memory directly via `/proc/<PID>/mem` - ✅ **High success rate**: 95%+ for all commercial protections (with root access) - ✅ **Proven against**: IJIAMI (爱加密), Bangcle (梆梆), 360 (360加固), Tencent (腾讯加固) **Usage Example**: ```bash # 1. Ensure device has root access adb shell su -c "echo root_ok" # 2. Run root memory extractor python3 scripts/root_memory_extractor.py --package com.target.app --verbose # 3. Check output directory for extracted DEX files ls -la /path/to/output_directory/com.target.app_root_unpacked/ ``` **Technical Details**: - Locates DEX memory regions via `/proc/<PID>/maps` (searching for `anon:dalvik-DEX data`) - Extracts all readable regions using `dd if=/proc/<PID>/mem` - Intelligently combines regions and crops to exact DEX size - Validates DEX structure integrity before saving ### 5.3 Success Rates by Protection Type (Updated: 2026-04-10) | Reinforcement Vendor | Frida-based | Enhanced Frida (v2.2.0) | Root Memory | VDEX Support | Notes | |----------------------|-------------|--------------------------|-------------|--------------|-------| | **No reinforcement** | 98% | **98%** | 95% | N/A | Frida is faster | | **IJIAMI (爱加密)** | 30-50% | **70-85%** | **95%+** | N/A | Enhanced Frida improves success significantly | | **Bangcle (梆梆)** | 10-20% | **50-65%** | **90%+** | N/A | Still challenging, root recommended | | **360加固** | 80% | **85-90%** | **95%+** | N/A | Both work well | | **Tencent (腾讯)** | 75% | **80-85%** | **95%+** | N/A | Enhanced hooks improve Frida success | | **Baidu (百度)** | 85% | **90-95%** | **95%+** | N/A | Already good, minor improvement | | **NetEase Yidun (网易易盾)** | 0-10% | **15-25%** | **85%+** | ✅ **Yes** | VDEX format support added (v2.0.1) | | **Strong anti-debug style** | 10-20% | **60-75%** | **90%+** | N/A | Major improvement with enhanced anti-debug | **Key Improvements with v2.2.0**: - **Strong anti-debug apps**: +50% success rate with enhanced anti-debug bypass - **IJIAMI**: +35% success rate with better hiding and timing - **Bangcle**: +45% success rate with Thread.stop() and /proc file hooks - **General**: +10% success rate with comprehensive hooking strategy **Recommendation Strategy**: 1. **First attempt**: Enhanced Frida with anti-debug bypass 2. **If fails**: Root memory extraction (bypasses all application-layer detection) 3. **If root not available**: Memory snapshot attack 4. **Last resort**: Static analysis of encrypted configurations ## 6. Recent Breakthroughs (2026-03-30) ### 6.1 IJIAMI Commercial Reinforcement Bypassed **Breakthrough**: Successfully extracted complete DEX from `Example_App_1.0.0.apk` (IJIAMI commercial edition). **Method Used**: Root memory extraction via `/proc/<PID>/mem` direct reading. **Results**: - ✅ **Main application DEX**: 7.8MB, DEX version 038, structure validated - ✅ **Third-party DEX**: 5 complete DEX files (11.7MB total) - ✅ **Total extracted**: 6 DEX files, 19.5MB analyzable code **Technical Significance**: - Proved root memory reading completely bypasses IJIAMI's anti-debug - Established new attack paradigm: static memory analysis > dynamic injection - Technique applicable to all Android reinforcements (requires root) ### 6.2 Skill Updates - Added `root_memory_extractor.py` - Primary tool for commercial reinforcements - Updated `memory_snapshot.py` - Enhanced with root memory fallback - Cleaned skill directory - Removed temporary files, focused on core scripts - Updated documentation - Added usage strategies and success rates ### 6.3 VDEX Processing Capability Enhanced (v2.0.1) **Breakthrough**: Successfully extracted DEX from NetEase Yidun VDEX (Verifier DEX) format, achieving complete runtime DEX extraction for a music streaming application. **VDEX Support Added**: 1. ✅ **Automatic VDEX detection** - Detects `vdex` magic header (vdex027 format) 2. ✅ **DEX extraction from VDEX** - Extracts all embedded DEX files from VDEX data 3. ✅ **Smart cropping integration** - Enhanced `smart_crop_dex()` method with VDEX support 4. ✅ **Multiple DEX file saving** - Extracts and saves all DEX files found in VDEX **Test Results (2026-03-30)**: - **Music Streaming Application (VDEX protected)**: - ✅ Detected VDEX format: `vdex027` - ✅ Extracted **13 complete DEX files** from 189MB VDEX data - ✅ Total DEX size: ≈100MB (including 71KB shell DEX) - ✅ All DEX files validated (DEX version 035) - **Smart Device Control Application (Encrypted mode)**: - ✅ Root memory extraction successful (1.6GB data) - ⚠️ Memory encryption detected (all-zero header) - ✅ Demonstrated NetEase Yidun dual protection modes: - **Mode A (Strong encryption)**: Memory encryption with all-zero headers - **Mode B (VDEX optimization)**: VDEX format with extractable DEX **Technical Implementation**: - New method: `is_vdex_data()` - VDEX format detection - New method: `extract_dex_from_vdex()` - VDEX to DEX conversion - Enhanced `smart_crop_dex()` - Auto-detects VDEX and extracts DEX - Byte-by-byte sliding window search - Ensures all DEX files are found - Validation system - Verifies DEX structure integrity before saving **Significance**: - First OpenClaw skill with VDEX processing capability - Enables complete DEX extraction from NetEase Yidun commercial reinforcement - Establishes foundation for ART/OAT format support - Provides technical blueprint for future Android runtime format processing ### 6.4 Enhanced Anti-Debug Bypass for Strong Protections (v2.2.0 - 2026-04-10) **Breakthrough**: Significantly improved anti-debug bypass capabilities targeting strong anti-debug style protections that previously caused "script has been destroyed" errors. **Enhanced Anti-Debug Features**: 1. ✅ **Thread.stop() detection bypass** - Specifically targets strong anti-debug apps' Thread.stop() overload detection 2. ✅ **/proc file access hiding** - Hides sensitive /proc/self/status, /proc/self/maps files 3. ✅ **Tracepid system call blocking** - Blocks tracepid() calls used by advanced anti-debug 4. ✅ **Enhanced Frida hiding** - Better hiding of Frida threads and memory mappings 5. ✅ **Timing randomization** - Random delays to bypass timing-based detection 6. ✅ **Multiple file operation hooks** - Hooks fopen, open, readlink, etc. to hide debugger traces **Optimized Protection Type Detection**: - **Auto-detection**: Automatically detects protection type (strong anti-debug, IJIAMI, Bangcle, etc.) - **Targeted optimizations**: Applies specific optimizations based on detected protection - **Configuration tuning**: Adjusts injection delays, heartbeat intervals for different protections **Technical Implementation**: - Enhanced `antidebug_bypass.py` with strong anti-debug specific optimizations - Multi-layer hooking strategy (Java + Native + System) - Dynamic configuration based on protection type detection - Improved verification system with detailed results reporting **Usage Example**: ```bash # Auto-detect protection and apply optimizations python3 scripts/antidebug_bypass.py --package com.example.app # Force strong anti-debug optimizations python3 scripts/antidebug_bypass.py --package com.example.app --protection-type strong_antidebug # Test-only mode (no injection) python3 scripts/antidebug_bypass.py --package com.target.app --test-only --verbose ``` **Success Rate Improvement**: | Protection Type | Before v2.2.0 | After v2.2.0 | Improvement | |-----------------|---------------|--------------|-------------| | **Strong anti-debug apps** | 10-20% | 60-75% | +50% points | | **IJIAMI Commercial** | 30-50% | 70-85% | +35% points | | **Bangcle** | 10-20% | 50-65% | +45% points | | **General Protections** | 80-90% | 90-95% | +10% points | ### 6.5 Handling Strong Anti-Debug Applications **Problem**: Applications like Example_App_4.7.6.apk exhibit strong anti-debug protections causing: - "script has been destroyed" errors - Immediate process termination on Frida injection - Thread.stop() overload detection - /proc file scanning for debugger traces **Solution Workflow**: 1. **Analysis First**: ```bash ./scripts/android-armor-breaker analyze --apk Example_App_4.7.6.apk --verbose ``` 2. **Enhanced Anti-Debug Bypass**: ```bash python3 scripts/antidebug_bypass.py --package com.example.app \ --protection-type strong_antidebug --verbose ``` 3. **Root Memory Extraction (if Frida fails)**: ```bash python3 scripts/root_memory_extractor.py --package com.example.app \ --verbose --output ./example_app_dex_output ``` 4. **Memory Snapshot Attack (for immediate crashes)**: ```bash python3 scripts/memory_snapshot.py --package com.example.app ``` **Key Techniques for Strong Anti-debug Apps**: - **Thread.stop() interception**: Prevents anti-debug from terminating Frida - **/proc file redirection**: Redirects /proc/self/status to /dev/null - **Delayed injection**: 20-second delay to bypass startup detection - **Memory mapping hiding**: Hides Frida's memory regions from scans **Fallback Strategies**: 1. **Primary**: Enhanced Frida with anti-debug bypass 2. **Secondary**: Root memory extraction (bypasses all application-layer detection) 3. **Tertiary**: Memory snapshot attack (for immediately crashing apps) 4. **Last Resort**: Static analysis of encrypted configs (as demonstrated with tik.tunnel.pro) ### 6.6 Skill Optimization Summary (2026-04-10) **Completed Optimizations**: 1. ✅ **Anti-debug enhancement** - Major upgrade to handle strong anti-debug style protections 2. ✅ **Internationalization completion** - Full English/Chinese support in all core modules 3. ✅ **Code quality improvements** - Syntax validation, import testing 4. ✅ **Documentation updates** - Added strong anti-debug case study and success rates **Remaining Technical Debt**: 1. ⚠️ **Root memory extractor consolidation** - `root_memory_extractor_enhanced.py` needs evaluation 2. ⚠️ **Test suite expansion** - Need comprehensive functional tests 3. ⚠️ **Performance optimization** - Large memory dump processing can be optimized **Future Roadmap**: 1. **Q2 2026**: Consolidate root memory extraction scripts 2. **Q2 2026**: Add automated test suite with mock APKs 3. **Q3 2026**: Enhance VDEX/ART/OAT format support 4. **Q3 2026**: Add AI-assisted unpacking strategy selection **Current Status**: - **Overall Health**: ✅ Good (8.2/10) - **Strong Anti-debug Success Rate**: ⚠️ Moderate (60-75% with new enhancements) - **Code Maintainability**: ✅ Good - **Documentation**: ✅ Comprehensive - **Internationalization**: ✅ Complete

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 android-armor-breaker-1776073866 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 android-armor-breaker-1776073866 技能

通过命令行安装

skillhub install android-armor-breaker-1776073866

下载 Zip 包

⬇ 下载 android-armor-breaker v2.2.2

文件大小: 96.67 KB | 发布时间: 2026-4-14 09:37

v2.2.2 最新 2026-4-14 09:37
Security compliance release: Added comprehensive security documentation (SECURITY.md), enhanced skill documentation with security warnings, addressed ClawHub security mark concerns, provided responsible use guidelines and legal compliance framework.

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部