Inspeckage - Android Package Inspector

Through the hooks applied to some functions of Android API, we can better understand what an Android application is doing at runtime.

Inspeckage will let you interact with some elements of the app, such as activities and providers (even unexported ones), and apply some settings on Android.

How it works?

It is a simply application with an internal HTTP server providing a friendly web interface.

Author(s): 
Package: 
mobi.acpm.inspeckage
Version name: 
2.0
Release type: 
Stable (low risk of bugs)
Number of downloads: 
992 in total · 89 in the last 24 hours
MD5 checksum: 
abdbe8b11141cb541626123cc7d8e99c
Uploaded on: 
Tuesday, September 20, 2016 - 17:35
Changes: 

Android 6 / SSL + Auth / okhttp3 pinning bypass

# Inspeckage - CHANGELOG

2.0
---------------
- New menu option "SSL / Authentication" (only Android 6) - Now you can use https with basic authentication.
- SSL uncheck (pinning bypass) - okhttp3
- Android 6 permissions fix

1.4.1
---------------

- add the option "Bind to address" on "Config" app screen - now you can bind to all interfaces, any specific local IP address, or to just the loopback interface.
Note: if you choose a non-loopback interface, other computers maybe can access the Inspeckage.
- bug fix - the "App is running:" always false

1.4
---------------

- tabs with badges (counter);
- for "+ Hooks", FLAG_SECURE and proxy options you dont need restart the app;
- enable/disable hooks (tabs);
- support to android 4.x (experimental);
- android:allowBackup in info area;
- app icon in info area;
- some bug fixes.

1.3
---------------

- New tab "+ Hooks". Now the user can specify new hook's dynamically.
- collapsible app info area
- some bug fixes

1.2
---------------

New logcat.html page. A experimental page with websocket to show some information from the logcat.

1.1b
---------------

Fix the backpressed crash
Fix intent launch not found
Improvements in the Start Activity option

1.0b
---------------

With Inspeckage, we can get a good amount of information about the application's behavior:

== Information gathering

* Requested Permissions;
* App Permissions;
* Shared Libraries;
* Exported and Non-exported Activities, Content Providers,Broadcast Receivers and Services;
* Check if the app is debuggable or not;
* Version, UID and GIDs;
* etc.

== Hooks (so far)

With the hooks, we can see what the application is doing in real time:

* Shared Preferences (log and file);
* Serialization;
* Crypto;
* Hashes;
* SQLite;
* HTTP (an HTTP proxy tool is still the best alternative);
* File System;
* Miscellaneous (Clipboard, URL.Parse());
* WebView;
* IPC.

== Actions

With Xposed it's possible to perform actions such as start a unexported activity and much else:

* Start any activity (exported and unexported);
* Call any provider (exported and unexported);
* Disable FLAG_SECURE;
* SSL uncheck;
* Start, stop and restart the application.

== Extras

* APK Download;
* View the app's directory tree;
* Download the app's files;
* Download the output generated by hooks in text file format;
* Take a screen capture;

== Configuration

Even though our tool has some hooks to the HTTP libraries, using an external proxy tool is still the best option to analyze the app's traffic. With Inspeckage, you can:

* Add a proxy to the target app;
* Enable and disable proxy;
* Add entries in the arp table.

Version name: 
1.4.1
Release type: 
Stable (low risk of bugs)
Number of downloads: 
2,366 in total · 6 in the last 24 hours
MD5 checksum: 
54e2770b347d2e183c8eacf0f0ca8e43
Uploaded on: 
Wednesday, July 20, 2016 - 03:26
Changes: 

1.4.1
---------------

- add the option "Bind to address" on "Config" app screen - now you can bind to all interfaces, any specific local IP address, or to just the loopback interface.
Note: if you choose a non-loopback interface, other computers maybe can access the Inspeckage.
- bug fix - the "App is running:" always false

1.4
---------------

- tabs with badges (counter);
- for "+ Hooks", FLAG_SECURE and proxy options you dont need restart the app;
- enable/disable hooks (tabs);
- support to android 4.x (experimental);
- android:allowBackup in info area;
- app icon in info area;
- some bug fixes.

1.3
---------------

- New tab "+ Hooks". Now the user can specify new hook's dynamically.
- collapsible app info area
- some bug fixes

1.2
---------------

New logcat.html page. A experimental page with websocket to show some information from the logcat.

1.1b
---------------

Fix the backpressed crash
Fix intent launch not found
Improvements in the Start Activity option

1.0b
---------------

With Inspeckage, we can get a good amount of information about the application's behavior:

== Information gathering

* Requested Permissions;
* App Permissions;
* Shared Libraries;
* Exported and Non-exported Activities, Content Providers,Broadcast Receivers and Services;
* Check if the app is debuggable or not;
* Version, UID and GIDs;
* etc.

== Hooks (so far)

With the hooks, we can see what the application is doing in real time:

* Shared Preferences (log and file);
* Serialization;
* Crypto;
* Hashes;
* SQLite;
* HTTP (an HTTP proxy tool is still the best alternative);
* File System;
* Miscellaneous (Clipboard, URL.Parse());
* WebView;
* IPC.

== Actions

With Xposed it's possible to perform actions such as start a unexported activity and much else:

* Start any activity (exported and unexported);
* Call any provider (exported and unexported);
* Disable FLAG_SECURE;
* SSL uncheck;
* Start, stop and restart the application.

== Extras

* APK Download;
* View the app's directory tree;
* Download the app's files;
* Download the output generated by hooks in text file format;
* Take a screen capture;

== Configuration

Even though our tool has some hooks to the HTTP libraries, using an external proxy tool is still the best option to analyze the app's traffic. With Inspeckage, you can:

* Add a proxy to the target app;
* Enable and disable proxy;
* Add entries in the arp table.

Version name: 
1.4
Release type: 
Stable (low risk of bugs)
Number of downloads: 
1,112 in total · 1 in the last 24 hours
MD5 checksum: 
d3e2ef0039025d058e01ddc5ee1fa2d3
Uploaded on: 
Thursday, July 7, 2016 - 17:00
Changes: 

- tabs with badges (counter);
- for "+ Hooks", FLAG_SECURE and proxy options you dont need restart the app;
- enable/disable hooks (tabs);
- support to android 4.x (experimental);
- android:allowBackup in info area;
- app icon in info area;
- some bug fixes.

Version name: 
1.3
Release type: 
Stable (low risk of bugs)
Number of downloads: 
2,488 in total · 1 in the last 24 hours
MD5 checksum: 
e0239cba9944017c6cf34aef26dfa5f8
Uploaded on: 
Tuesday, April 19, 2016 - 08:11
Changes: 

- New tab "+ Hooks". Now the user can specify new hook's dynamically.
- collapsible app info area
- some bug fixes

Version name: 
1.2
Release type: 
Beta (some bugs to be expected)
Number of downloads: 
1,206 in total · 2 in the last 24 hours
MD5 checksum: 
b41be848e3496d4bace7f05210773ad0
Uploaded on: 
Wednesday, March 23, 2016 - 05:20
Changes: 

New logcat.html page. A experimental page with websocket to show some information from the logcat.

Version name: 
1.1b
Release type: 
Beta (some bugs to be expected)
Number of downloads: 
2,939 in total · 1 in the last 24 hours
MD5 checksum: 
7d4cb2e172ea767f388156b533e51cea
Uploaded on: 
Monday, March 7, 2016 - 02:48
Changes: 

Fix the backpressed crash
Fix intent launch not found
Improvements in the Start Activity option

Version name: 
1.0b
Release type: 
Beta (some bugs to be expected)
Number of downloads: 
914 in total · 0 in the last 24 hours
MD5 checksum: 
8f5f228b68e386663f42ca0c81601f79
Uploaded on: 
Monday, February 29, 2016 - 00:27
Changes: 

This is the first version.

Features

With Inspeckage, we can get a good amount of information about the application's behavior:

== Information gathering

* Requested Permissions;
* App Permissions;
* Shared Libraries;
* Exported and Non-exported Activities, Content Providers,Broadcast Receivers and Services;
* Check if the app is debuggable or not;
* Version, UID and GIDs;
* etc.

== Hooks (so far)

With the hooks, we can see what the application is doing in real time:

* Shared Preferences (log and file);
* Serialization;
* Crypto;
* Hashes;
* SQLite;
* HTTP (an HTTP proxy tool is still the best alternative);
* File System;
* Miscellaneous (Clipboard, URL.Parse());
* WebView;
* IPC.

== Actions

With Xposed it's possible to perform actions such as start a unexported activity and much else:

* Start any activity (exported and unexported);
* Call any provider (exported and unexported);
* Disable FLAG_SECURE;
* SSL uncheck;
* Start, stop and restart the application.

== Extras

* APK Download;
* View the app's directory tree;
* Download the app's files;
* Download the output generated by hooks in text file format;
* Take a screen capture;

== Configuration

Even though our tool has some hooks to the HTTP libraries, using an external proxy tool is still the best option to analyze the app's traffic. With Inspeckage, you can:

* Add a proxy to the target app;
* Enable and disable proxy;
* Add entries in the arp table.