andro-hunting is an automated tool designed to analyze Android's Deeplink Webview Hijacking Vulnerability.
python3 -m venv venv-> Create a virtual environment.source venv/bin/activate-> Activate the virtual environment.pip install -r requirements.txt-> Install required packages.cp .env.example .env-> Create a.envfile and set your URL.cp applist.txt.example applist.txt-> Write the app's package names inapplist.txt.- Now You can run the script!
System Requirements:
- Python 3
- ADB (must be connected to only one ADB server)
- Rooted device or emulator (for
sub.py) - Logged in to Play Store
- Frida (for
sub.py)
Refer to our wiki page for detailed usage instructions.
- MAIN
- SUB
- CHEATSHEET
The primary purpose of Andro-Hunting is to automate the WebView hijacking Proof of Concept (PoC) through large-scale Android app analysis. It is highly effective for mobile bug hunting. You can modify deep link URL parameters to include webhooks site, Discord server addresses, etc., to receive automatic alerts.
- Parse and analyze APK files
- Extract deeplink information and create various URL combinations
- Automate WebView hijacking PoC
sub.py is a tool designed to research attack vector expansion based on the app information analyzed by main.py. It allows automatic deeplink testing, bypassing XSS filters, and provides functionality for log analysis and method hooking for deeplink, WebView and JavaScript Interface methods.
- Automatic XSS testing
- Save dumpsys and logcat logs on deeplink invocation
- Automatic deeplink, WebView and JavaScript Interface methods hooking
XSS Testing
DeepLink/WebView/JSI Monitoring



