Skip to content

Commit 3fa05cd

Browse files
author
HackTricks News Bot
committed
Add content from: Jezail: Rooted Android Pentesting Toolkit exposing a REST AP...
1 parent 0e923d3 commit 3fa05cd

1 file changed

Lines changed: 8 additions & 0 deletions

File tree

  • src/mobile-pentesting/android-app-pentesting

src/mobile-pentesting/android-app-pentesting/README.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,13 @@ java -jar ../APKEditor.jar m -i splits/ -o merged.apk
5656
java -jar uber-apk-signer.jar -a merged.apk --allowResign -o merged_signed
5757
```
5858

59+
## Jezail rooted Android pentesting toolkit (REST API + web UI)
60+
61+
- Runs on a **rooted device** (Magisk/rootAVD) and starts an **HTTP server on tcp/8080** with a **Flutter web UI** and **REST API**.
62+
- Install the release APK with perms: `adb install -g -r jezail.apk`, then launch the app (server auto-starts).
63+
- Endpoints: `http://<device-ip>:8080/` (UI), `http://<device-ip>:8080/api/json` (API listing), `http://<device-ip>:8080/api/swagger` (Swagger).
64+
- Emulator port-forward to reach UI/API from the host: `adb forward tcp:8080 tcp:8080` then browse `http://localhost:8080`.
65+
5966
## Android Enterprise & Work Profile Attacks
6067

6168
{{#ref}}
@@ -891,5 +898,6 @@ AndroL4b is an Android security virtual machine based on ubuntu-mate includes th
891898
- [smali-sslpin-patterns](https://github.com/aancw/smali-sslpin-patterns)
892899
- [Build a Repeatable Android Bug Bounty Lab: Emulator vs Magisk, Burp, Frida, and Medusa](https://www.yeswehack.com/learn-bug-bounty/android-lab-mobile-hacking-tools)
893900
- [CoRPhone — Android in-memory JNI execution and packaging pipeline](https://github.com/0xdevil/corphone)
901+
- [Jezail rooted Android pentesting toolkit (REST API + Flutter UI)](https://github.com/zahidaz/jezail)
894902

895903
{{#include ../../banners/hacktricks-training.md}}

0 commit comments

Comments
 (0)