Automated Android penetration testing environment for Linux.
- Arch Linux (yay / pacman)
- Ubuntu / Debian (apt)
- Fedora (dnf)
- Linux (see supported platforms above)
- 20GB+ free disk space
burp.der— Burp certificate (DER format) in the project directory beforesetup.sh- Host tools (install yourself; not installed by this repo):
git,pipx, OpenSSL (opensslCLI);jadxis optional (recommended) setup.shasks you to confirmgitandpipxare installed, verifies them onPATH, and warns ifjadxis missing- Android SDK licenses are accepted non-interactively via
yes | sdkmanager --licensesduring setup - Place
burp.dernext tosetup.sh(or exportBURP_DERwhen runningrootAVD.shalone);setup.shalways uses the repo directory, not your current working directory
git clone https://github.com/Alpastx/Android-PT-Setup.git
cd Android-PT-Setup
bash setup.shbash verify.sh # Static checks (see below)
bash verify.sh --live # Also boots each AVD briefly (root, proxy on A10, Magisk hint on A14PR)Static checks: ANDROID_HOME / ~/android_sdk, host tools (git, pipx, openssl; jadx optional), SDK tools (adb, sdkmanager, avdmanager; emulator warns if missing), pipx tools (frida, objection, apkleaks, pyapktool or apktool), burp.der beside the repo scripts, AVDs and system images, rootAVD + Magisk.zip, shell RC entries (including A14PR alias). Live checks: adb root / su where applicable, optional frida-server on device, HTTP proxy only for A10, CA store sanity on A10, Magisk on A14PR.
bash uninstall.shA10 # Launch Android 10 (rooted + Burp cert + proxy)
A14PR # Launch Android 14 (Magisk root)
# frida-server on the device is not installed by setup — download a build matching
# your host frida-tools version and push to /data/local/tmp/ when needed, then:
# adb shell "/data/local/tmp/frida-server &"- Android SDK (platform-tools, cmdline-tools; install emulator via
sdkmanagerifemulatoris missing) - AVDs: A10 (API 29) — rooted, Burp CA in system store, HTTP proxy to host; A14PR (API 34) — Magisk via rootAVD
- pipx: frida-tools, objection, apkleaks, pyapktool
| Script | Description |
|---|---|
setup.sh |
Full installation |
verify.sh |
Post-setup health check |
uninstall.sh |
Remove everything |
rootAVD.sh <AVD> |
A10 Burp/system CA + proxy; A14PR Magisk ramdisk patch |
HWKeys.sh <AVD> |
Enable hardware keyboard |
Tools-downloader.sh |
Download platform-tools, cmdline-tools, Magisk APK as zip |
lib.sh |
Shared utility library |
- Export Burp cert as
burp.der - Place in project directory before running
setup.sh - A10: certificate is installed to the system CA store; proxy set to
10.0.2.2:8080(override withBURP_PORT) - A14PR: Burp trust is not automated by this repo — configure manually if needed
~/android_sdk/ # SDK and tools
~/android_sdk/rootAVD/ # rootAVD + Magisk
~/.android/avd/ # AVD configs
google_apisimage,-writable-system- Burp certificate in
/system/etc/security/cacerts/, AVB disabled for persistence - HTTP proxy via
settings put global http_proxy
google_apis_playstoreimage- Rooted with rootAVD + Magisk (ramdisk patch)
| Tool | Purpose |
|---|---|
| frida-tools | Dynamic instrumentation (install with pipx) |
| objection | Runtime exploration (pipx) |
| apkleaks | Scan APKs for secrets (pipx) |
| pyapktool | APK tooling (pipx) |
| jadx | Decompiler — install via distro package manager |
| adb | From platform-tools |
Added to your shell RC (~/.zshrc or ~/.bashrc):
export ANDROID_HOME=$HOME/android_sdk
export PATH="$HOME/android_sdk/cmdline-tools/latest/bin:$PATH"
export PATH="$HOME/android_sdk/platform-tools:$PATH"
export PATH="$HOME/android_sdk/emulator:$PATH"