AndroTickler - Penetration testing and auditing toolkit for Android apps.

AndroTickler – Penetration testing and auditing toolkit for Android apps.

A java tool that helps to pentest Android apps faster, more easily and more efficiently. AndroTickler offers many features of information gathering, static and dynamic checks that cover most of the aspects of Android apps pentesting. It also offers several features that pentesters need during their pentests. AndroTickler also integrates with Frida to provide method tracing and manipulation. It was previously published under the name of Tickler.

AndroTickler requires a linux host and a rooted Android device connected to its USB port. The tool does not install anything on the Android device, it only creates a Tickler directory on /sdcard . AndroTickler depends on Android SDK to run commands on the device and copy app’s data to TicklerWorkspace directory on the host for further analysis. TicklerWorkspace is the working directory of AndroTickler and each app has a separate subdirectory in TicklerWorkspace which can contain the following (depending on user actions):

+ DataDir directory: a copy of the data directory of the app
+ extracted directory: Output of apktool on the app, contains smali code, resources, libraries…etc.
+ bgSnapshots directory: Contains background snapshots copied from the device.
+ images directory: contains any screenshots taken for the app.
+ JavaCode directory: Contains app’s Java code decompiled by dex2jar and JD tools
+ logs directory: contains log files produced by -t -log, as explained below
+ transfers: files and directories copied from the device to the host using -copy2host
+ AndroidManifest.xml: The manifest file of the app as per apktool
+ base.apk: the APK file of the app, installed on the device
+ debuggable.apk: a debuggable version of the app, produced by -dbg


libs directory and Tickler.conf configuration file exist in the same directory of the jar file. The configuration file sets the location of TicklerDir directory on the host and Tickler on /sdcard of the android device. If the configuration file does not exist or these 2 directories are not set, then default values will be used (Tickler_workspace on the current directory and /sdcard/Tickler respectively). Tickler_lib directory contains some Java libraries and external tools used by AndroTickler such as apktool and dex2jar.

AndroTickler highly depends on the following tools, so they should exist on your machine before using it:
+ Java 7 or higher
+ Android SDK tools (adb and friends)
+ sqlite3

Other tools are required for some features, but AndroTickler can still run without them:
+ Frida
+ jarsigner

Usage and Building: