# lu77U-MobileSec
**🛡️ Professional Mobile Security Analysis & Vulnerability Patching Tool 🔐**
An advanced, AI-powered security analysis platform for Android applications with automatic vulnerability detection and intelligent fix generation. Supports Java/Kotlin, React Native, and Flutter frameworks with comprehensive static and dynamic analysis capabilities.
## ⭐ Key Features
- **🔍 Multi-Framework Support**: Java/Kotlin, React Native, Flutter with specialized analyzers
- **🤖 AI-Powered Analysis**: Groq API and Ollama integration for intelligent vulnerability detection
- **🚀 Dynamic Analysis**: MobSF integration for real-time application testing
- **📊 Comprehensive Reporting**: Structured output with severity scoring and fix recommendations
- **🛠️ Automated Setup**: Built-in dependency installer and system doctor
- **💻 Interactive CLI**: User-friendly interface with guided analysis workflows
<details>
<summary>🔧 Installation & Setup</summary>
## Installation
### Automated Installation (Recommended)
The tool includes an automated dependency installer that handles all required tools:
```bash
# Install the package
pip install lu77U-MobileSec
# Run system doctor to install missing dependencies
lu77u-mobilesec doctor
# Start analyzing APKs
lu77u-mobilesec your-app.apk
```
### Manual Setup by Platform
**macOS**
```bash
# Using Homebrew
brew install jadx node openjdk apktool
# Install Python package
pip install lu77U-MobileSec
```
**Linux (Ubuntu/Debian)**
```bash
# Install system dependencies
sudo apt update
sudo apt install openjdk-11-jdk nodejs npm
# Download and install JADX
wget https://github.com/skylot/jadx/releases/latest/download/jadx-1.4.7.zip
unzip jadx-1.4.7.zip -d /opt/jadx
sudo ln -s /opt/jadx/bin/jadx /usr/local/bin/jadx
# Install Python package
pip install lu77U-MobileSec
```
**Windows**
```powershell
# Using Chocolatey
choco install openjdk nodejs
# Download JADX and APKTool from GitHub releases
# Add to PATH manually
# Install Python package
pip install lu77U-MobileSec
```
### Core Dependencies
- **Python 3.8+**: Main runtime environment
- **JADX**: Java/Kotlin decompiler for Android apps
- **Java 11+**: Required for Android build tools
- **Node.js**: Required for React Native enhanced analysis
- **APKTool**: APK resource extraction and analysis
### Optional Dependencies
- **MobSF**: Dynamic analysis platform
- **Ollama**: Local LLM runtime for AI analysis
- **Android SDK Tools**: aapt for manifest parsing
- **Blutter**: Flutter Dart code recovery tool
### AI Configuration
**Groq API (Cloud)**
```bash
# Get API key from https://console.groq.com/
export GROQ_API_KEY="your-api-key-here"
```
**Ollama (Local)**
```bash
# Install Ollama
curl -fsSL https://ollama.ai/install.sh | sh
# Pull DeepSeek Coder model (automatically done by tool)
ollama pull deepseek-coder:6.7b
```
</details>
<details>
<summary>📖 Usage Guide</summary>
## Usage
### Basic Command Line Usage
```bash
# Basic analysis (auto-detect framework)
lu77u-mobilesec app.apk
# Force specific framework type
lu77u-mobilesec app.apk --type react-native
# Enable AI-powered vulnerability fixing
lu77u-mobilesec app.apk --fix
# Enable dynamic analysis (requires MobSF)
lu77u-mobilesec app.apk --dynamic
# Enhanced React Native analysis
lu77u-mobilesec app.apk --type react-native --enhanced-rn
# Check system dependencies
lu77u-mobilesec doctor
# Show help
lu77u-mobilesec --help
```
### Interactive Mode
Launch guided analysis with configuration options:
```bash
# Start interactive mode
lu77u-mobilesec
```
Interactive mode provides:
- **Framework Selection**: Choose analysis type manually
- **AI Configuration**: Select between Groq and Ollama
- **Dynamic Analysis Setup**: Configure MobSF integration
- **Debug Mode**: Enable verbose logging
- **Sample APK Access**: Built-in test applications
### Complete CLI Reference
**Arguments:**
- `APK_FILE`: Path to Android APK file to analyze
- `doctor`: Run system dependency checker and installer
**Options:**
- `--type {java,kotlin,react-native,flutter}`: Force specific analysis type
- `--fix`: Enable vulnerability auto-fix prompt after analysis
- `--dynamic`: Enable dynamic analysis using MobSF API
- `--enhanced-rn`: Use enhanced React Native analysis with decompilation
- `--llm {groq,ollama}`: Choose AI model provider (default: ollama)
- `--debug, -d`: Enable debug mode with verbose output
- `--version, -v`: Show program version and exit
- `--help, -h`: Show help message and exit
**Advanced Examples:**
```bash
# Full analysis with all features
lu77u-mobilesec app.apk --fix --dynamic --debug
# React Native with enhanced decompilation
lu77u-mobilesec app.apk --type react-native --enhanced-rn --fix
# Use Groq AI for analysis
lu77u-mobilesec app.apk --llm groq --fix
# Flutter analysis with debug output
lu77u-mobilesec app.apk --type flutter --debug --fix
```
</details>
<details>
<summary>🔍 Analysis Capabilities</summary>
## Framework-Specific Analysis
### Java/Kotlin Analysis
**Decompilation & Extraction:**
- **JADX Integration**: Full source code reconstruction from APK
- **Manifest Analysis**: Permission and component inspection
- **Resource Extraction**: Assets, strings, configuration files
- **DEX Analysis**: Dalvik bytecode processing
**Security Scanning:**
- **Code Pattern Detection**: Custom vulnerability rules
- **API Usage Analysis**: Android framework and library calls
- **Component Security**: Activity, Service, BroadcastReceiver analysis
- **Permission Analysis**: Dangerous permission usage patterns
**AI Integration:**
- **Context-Aware Analysis**: Understanding of Android architecture
- **Vulnerability Categorization**: Automatic classification and severity scoring
- **Fix Generation**: AI-generated patches for detected issues
### React Native Analysis
**Standard Analysis:**
- **Bundle Extraction**: JavaScript bundle identification and extraction
- **Bridge Analysis**: Native module interaction patterns
- **Component Scanning**: React component security assessment
- **Storage Analysis**: AsyncStorage and secure storage patterns
**Enhanced Analysis (--enhanced-rn):**
- **Bundle Decompilation**: Converts minified bundles back to readable modules
- **Module-Level Analysis**: Individual React Native module examination
- **Advanced Pattern Detection**: Bridge vulnerabilities, injection flaws
- **react-native-decompiler Integration**: Automatic tool installation and usage
**Supported Bundle Types:**
- `index.android.bundle`
- `main.jsbundle`
- Custom bundle configurations
- Hermes bytecode bundles
### Flutter Analysis
**Blutter Integration:**
- **Dart Code Recovery**: Extract Dart source from Flutter APK
- **Snapshot Analysis**: Dart VM snapshot processing
- **Asset Extraction**: Flutter-specific resource analysis
**Security Patterns:**
- **Widget Security**: Flutter widget vulnerability patterns
- **Platform Channel Analysis**: Native bridge security assessment
- **Engine Integration**: Flutter engine security evaluation
</details>
<details>
<summary>🚀 Dynamic Analysis (MobSF Integration)</summary>
## MobSF Dynamic Analysis
### Setup Requirements
1. **Install MobSF Server:**
```bash
# Clone and setup MobSF
git clone https://github.com/MobSF/Mobile-Security-Framework-MobSF.git
cd Mobile-Security-Framework-MobSF
./setup.sh
```
2. **Start MobSF Server:**
```bash
# Start server (usually http://localhost:8000)
python manage.py runserver
```
3. **Get API Key:**
- Access MobSF web interface
- Navigate to API Key section
- Generate and copy API key
### Dynamic Analysis Workflow
```bash
# Run with dynamic analysis
lu77u-mobilesec app.apk --dynamic
```
**Analysis Process:**
1. **APK Upload**: Automatic upload to MobSF server
2. **Static Analysis**: MobSF performs initial static scan
3. **Dynamic Setup**: Configures testing environment
4. **Runtime Testing**: Monitors application behavior
5. **Report Generation**: Combines static and dynamic results
### Dynamic Analysis Features
**Real-time Monitoring:**
- **Network Traffic**: HTTP/HTTPS request monitoring
- **File System Access**: Runtime file operation tracking
- **Component Interaction**: Activity and service behavior
- **API Endpoint Discovery**: Automatic endpoint detection
**Security Testing:**
- **SSL/TLS Validation**: Certificate and encryption analysis
- **Authentication Testing**: Session management evaluation
- **Input Validation**: Runtime injection testing
- **Permission Usage**: Runtime permission analysis
**Integration Benefits:**
- **Combined Results**: Static + dynamic vulnerability correlation
- **Behavioral Context**: Understanding of application runtime behavior
- **Network Security**: Comprehensive communication analysis
- **False Positive Reduction**: Dynamic validation of static findings
</details>
<details>
<summary>🤖 AI-Powered Analysis</summary>
## AI Integration & Capabilities
### Groq API Integration
**Features:**
- **Cloud-based Processing**: High-performance LLM analysis
- **Real-time Analysis**: Fast vulnerability detection and fix generation
- **Latest Models**: Access to cutting-edge language models
- **Scalable**: Handles large codebases efficiently
**Setup:**
```bash
# Set API key
export GROQ_API_KEY="your-groq-api-key"
# Use Groq for analysis
lu77u-mobilesec app.apk --llm groq --fix
```
### Ollama Integration (Local LLM)
**Features:**
- **Privacy-focused**: All analysis runs locally
- **DeepSeek Coder Model**: Specialized for code analysis
- **Offline Operation**: No internet required after setup
- **Cost-effective**: No API usage fees
**Setup:**
```bash
# Ollama installation (automatic via tool)
# Model download (automatic on first use)
# Use Ollama (default)
lu77u-mobilesec app.apk --fix
```
### AI Analysis Capabilities
**Vulnerability Detection:**
- **Pattern Recognition**: Advanced code pattern analysis
- **Context Understanding**: Business logic comprehension
- **Semantic Analysis**: Meaning-based vulnerability detection
- **False Positive Filtering**: Intelligent result filtering
**Fix Generation:**
- **Automated Patching**: AI-generated code fixes
- **Context-aware Solutions**: Fixes that understand application architecture
- **Multiple Fix Options**: Alternative solutions for complex issues
- **Explanation Generation**: Detailed fix rationale and implementation
**Severity Assessment:**
- **CVSS Integration**: Standard vulnerability scoring
- **Context-based Scoring**: Application-specific risk assessment
- **Business Impact Analysis**: Understanding of security implications
- **Prioritization Guidance**: Risk-based fix ordering
</details>
<details>
<summary>📊 Output Structure & Reporting</summary>
## Analysis Results Organization
### Output Directory Structure
```
Works/
├── {apk_name}_{timestamp}/
│ ├── Dynamic Analysis/ # MobSF dynamic analysis results
│ │ ├── mobsf_report.json # Complete MobSF analysis
│ │ ├── network_traffic.json # Network monitoring data
│ │ └── runtime_analysis.json # Behavioral analysis
│ ├── Files Processed for Working/ # Extracted and processed files
│ │ ├── decompiled/ # JADX/Blutter output
│ │ ├── resources/ # Extracted resources
│ │ └── manifest/ # Manifest analysis
│ ├── Fixes Requested/ # AI-generated vulnerability fixes
│ │ ├── vulnerability_fixes.json # Structured fix data
│ │ └── fix_code/ # Generated code patches
│ ├── Prompts Given to AI/ # AI analysis prompts
│ │ └── analysis_prompts.txt # Sent prompts for transparency
│ └── Response By AI/ # AI analysis responses
│ ├── vulnerability_analysis.json
│ └── detailed_responses.txt
```
### Report Types
**Vulnerability Summary:**
- High-level security assessment
- Risk categorization and scoring
- Executive summary of findings
- Remediation priority matrix
**Detailed Analysis:**
- File-by-file vulnerability breakdown
- Code snippets with vulnerability context
- Technical explanation of security issues
- Line-by-line analysis results
**Fix Recommendations:**
- AI-generated patch suggestions
- Implementation guidance
- Alternative solution approaches
- Testing recommendations
**Dynamic Results (if enabled):**
- Runtime behavior analysis
- Network traffic security assessment
- Component interaction patterns
- Real-time vulnerability validation
### File Formats
**JSON Format:**
- Structured data for integration
- Machine-readable vulnerability data
- API-friendly format for automation
- Standard vulnerability schema
**Human-readable Reports:**
- Clear vulnerability descriptions
- Step-by-step fix instructions
- Code examples and explanations
- Executive summaries
**Generated Code:**
- Ready-to-use patch files
- Commented fix implementations
- Alternative solution approaches
- Integration instructions
</details>
<details>
<summary>🔧 Advanced Configuration</summary>
## Framework-Specific Configuration
### React Native Enhanced Analysis
**Prerequisites:**
- Node.js (v14+) and npm
- Internet connection for tool installation
**Enhanced Features:**
```bash
# Enable enhanced analysis
lu77u-mobilesec app.apk --type react-native --enhanced-rn
```
**Capabilities:**
- **Bundle Decompilation**: Converts minified JavaScript to readable code
- **Module Resolution**: Individual React Native module analysis
- **Advanced Patterns**: Bridge vulnerability detection
- **Context Preservation**: Maintains function and component context
**Tool Integration:**
- **react-native-decompiler**: Automatic installation and usage
- **Bundle Processing**: Support for multiple bundle formats
- **Source Map Support**: When available, uses source maps for accuracy
### Flutter Analysis Configuration
**Blutter Integration:**
- **Automatic Setup**: Tool handles Blutter installation
- **Dart Recovery**: Extracts Dart source from compiled Flutter apps
- **Asset Processing**: Flutter-specific resource extraction
### Java/Kotlin Analysis Options
**JADX Configuration:**
- **Decompilation Options**: Optimized settings for security analysis
- **Resource Extraction**: Complete APK content extraction
- **Multi-threading**: Parallel processing for large APKs
### MobSF Configuration
**Server Setup:**
```bash
# Custom MobSF server URL
export MOBSF_URL="http://your-mobsf-server:8000"
# API key configuration
export MOBSF_API_KEY="your-api-key"
```
**Analysis Options:**
- **Static + Dynamic**: Combined analysis mode
- **Dynamic Only**: Runtime-focused testing
- **Custom Timeout**: Configurable analysis duration
</details>
<details>
<summary>🐛 Troubleshooting</summary>
## Common Issues & Solutions
### Installation Issues
**Problem: JADX not found**
```bash
# macOS
brew install jadx
# Linux - Download from releases
wget https://github.com/skylot/jadx/releases/latest/download/jadx-1.4.7.zip
unzip jadx-1.4.7.zip -d /opt/jadx
sudo ln -s /opt/jadx/bin/jadx /usr/local/bin/jadx
# Windows - Download and add to PATH
```
**Problem: Node.js required for React Native**
```bash
# macOS
brew install node
# Linux
sudo apt install nodejs npm
# Windows
choco install nodejs
```
**Problem: Java not found**
```bash
# Install OpenJDK 11+
brew install openjdk@11 # macOS
sudo apt install openjdk-11-jdk # Linux
choco install openjdk # Windows
```
### Analysis Issues
**Problem: APK parsing errors**
- Verify APK file integrity
- Check file permissions (readable)
- Use `--debug` flag for detailed error information
- Ensure APK is a valid Android application
**Problem: Decompilation failures**
- Large APKs may require more memory
- Corrupted APKs cannot be processed
- Some obfuscated APKs may have limited decompilation success
- Try different analysis types if auto-detection fails
**Problem: Framework detection issues**
- Use `--type` flag to force specific framework
- Check if APK contains expected framework files
- Some hybrid apps may need manual type specification
### MobSF Integration Issues
**Problem: MobSF connection fails**
- Verify MobSF server is running (`http://localhost:8000`)
- Check API key is correct
- Ensure network connectivity to MobSF server
- Verify MobSF version compatibility
**Problem: Dynamic analysis timeout**
- Increase timeout in MobSF settings
- Check device/emulator connectivity
- Ensure sufficient system resources
### AI Issues
**Problem: Groq API errors**
- Verify `GROQ_API_KEY` environment variable
- Check internet connectivity
- Ensure API quota is available
- Validate API key permissions
**Problem: Ollama not responding**
- Check if Ollama service is running: `ollama list`
- Verify DeepSeek Coder model: `ollama pull deepseek-coder:6.7b`
- Restart Ollama service: `ollama serve`
- Check system resources (RAM requirements)
**Problem: AI analysis slow**
- For Groq: Check internet speed and API limits
- For Ollama: Ensure sufficient RAM (8GB+ recommended)
- Use `--debug` to monitor analysis progress
### Performance Issues
**Problem: Long analysis times**
- Large APKs require more processing time
- Dynamic analysis adds significant time
- Enhanced React Native analysis is slower but more accurate
- Use selective analysis types for faster results
**Problem: Memory issues**
- Increase Java heap size for JADX
- Close other applications during analysis
- Use 64-bit Java installation
- Consider analyzing smaller APK subsets
### File Permission Issues
**Problem: Cannot write output files**
- Check write permissions in current directory
- Ensure sufficient disk space
- Verify user permissions for output location
</details>
<details>
<summary>🤝 Contributing</summary>
## Development & Contributions
### Development Setup
```bash
# Clone repository
git clone https://github.com/sam-mg/lu77U-MobileSec.git
cd lu77U-MobileSec
# Create virtual environment
python -m venv venv
source venv/bin/activate # Linux/macOS
# or
venv\Scripts\activate # Windows
# Install in development mode
pip install -e .
# Install development dependencies
pip install -e ".[dev]"
# Run tests
pytest
# Run linting
flake8 lu77u_mobilesec/
black lu77u_mobilesec/
mypy lu77u_mobilesec/
```
### Code Style & Standards
- **Black**: Code formatting (line length: 88)
- **Flake8**: Linting and style checking
- **MyPy**: Static type checking
- **Pytest**: Unit and integration testing
### Project Structure
```
lu77u_mobilesec/
├── ai/ # AI provider integrations
│ ├── processors/ # AI analysis processors
│ └── providers/ # Groq, Ollama implementations
├── cli/ # Command-line interface
├── constants/ # Framework definitions, patterns
├── core/ # Core analysis engine
│ ├── analyzers/ # Framework-specific analyzers
│ └── detectors/ # Framework detection logic
├── system/ # System validation and setup
├── tools/ # External tool integrations
│ ├── android_tools/ # Android SDK utilities
│ ├── decompilers/ # JADX, Blutter, RN decompiler
│ └── mobsf_scripts/ # MobSF API integration
└── utils/ # Utility functions
├── config/ # Configuration management
├── file_system/ # File operations
└── helpers/ # Helper functions
```
### Contributing Guidelines
1. **Fork the Repository**
- Create personal fork on GitHub
- Clone fork locally for development
2. **Create Feature Branch**
```bash
git checkout -b feature/amazing-feature
```
3. **Make Changes**
- Follow existing code style
- Add tests for new functionality
- Update documentation as needed
4. **Test Changes**
```bash
# Run tests
pytest
# Run linting
flake8 lu77u_mobilesec/
black lu77u_mobilesec/ --check
# Type checking
mypy lu77u_mobilesec/
```
5. **Commit Changes**
```bash
git add .
git commit -m "Add amazing feature"
```
6. **Push to Branch**
```bash
git push origin feature/amazing-feature
```
7. **Open Pull Request**
- Provide clear description of changes
- Reference any related issues
- Ensure CI checks pass
### Areas for Contribution
**New Framework Support:**
- Xamarin applications
- Ionic/Cordova apps
- Unity mobile games
- Progressive Web Apps (PWA)
**Vulnerability Patterns:**
- Additional security detection rules
- Framework-specific vulnerability patterns
- OWASP Mobile Top 10 implementations
- Custom vulnerability definitions
**AI Integrations:**
- Additional LLM providers (OpenAI, Anthropic)
- Custom model fine-tuning
- Specialized security models
- Local model optimizations
**Tool Integrations:**
- Additional decompilers
- Static analysis tools
- Dynamic analysis platforms
- CI/CD pipeline integrations
**Documentation:**
- Tutorial content
- Video guides
- Translations
- Best practices guides
**Testing:**
- Expanded test coverage
- Performance benchmarks
- Integration test scenarios
- Sample APK creation
### Development Tips
- Use `--debug` flag extensively during development
- Test with various APK types and sizes
- Ensure cross-platform compatibility
- Add logging for debugging complex issues
- Follow existing error handling patterns
</details>
## 📄 License
This project is licensed under the Apache License 2.0 - see the [LICENSE](LICENSE) file for details.
## 👨💻 Author
**Sam MG Harish (lu77_u)**
- Email: sammgharish@gmail.com
- GitHub: [@sam-mg](https://github.com/sam-mg)
---
## ⭐ Support
If you find this tool helpful, please consider:
- ⭐ Starring the repository
- 🐛 Reporting bugs and issues
- 💡 Suggesting new features
- 🤝 Contributing to the project
<p align="right">
<img src="https://wakatime.com/badge/user/f5bf5341-405c-480f-bd76-40a5c1a8ada9/project/f2697ac6-8530-46a0-ae2c-01eb4f730bdb.svg?style=for-the-badge"/>
</p>
Raw data
{
"_id": null,
"home_page": "https://github.com/sam-mg/lu77U-MobileSec",
"name": "lu77U-MobileSec",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.13",
"maintainer_email": null,
"keywords": "mobile-security, apk-analysis, android-security, vulnerability-detection, security-patches, pentesting, mobile-app-security, automated-fixes, lu77U",
"author": "Sam MG Harish (lu77_u)",
"author_email": "\"Sam MG Harish (lu77_u)\" <sammgharish@gmail.com>",
"download_url": "https://files.pythonhosted.org/packages/53/bc/ebd92f8447194901fbe5c7c641ee77aa8b7c50b6c2d87200fadce10e792f/lu77u_mobilesec-1.0.1.tar.gz",
"platform": null,
"description": "# lu77U-MobileSec\n\n**\ud83d\udee1\ufe0f Professional Mobile Security Analysis & Vulnerability Patching Tool \ud83d\udd10**\n\nAn advanced, AI-powered security analysis platform for Android applications with automatic vulnerability detection and intelligent fix generation. Supports Java/Kotlin, React Native, and Flutter frameworks with comprehensive static and dynamic analysis capabilities.\n\n## \u2b50 Key Features\n\n- **\ud83d\udd0d Multi-Framework Support**: Java/Kotlin, React Native, Flutter with specialized analyzers\n- **\ud83e\udd16 AI-Powered Analysis**: Groq API and Ollama integration for intelligent vulnerability detection\n- **\ud83d\ude80 Dynamic Analysis**: MobSF integration for real-time application testing\n- **\ud83d\udcca Comprehensive Reporting**: Structured output with severity scoring and fix recommendations\n- **\ud83d\udee0\ufe0f Automated Setup**: Built-in dependency installer and system doctor\n- **\ud83d\udcbb Interactive CLI**: User-friendly interface with guided analysis workflows\n\n<details>\n<summary>\ud83d\udd27 Installation & Setup</summary>\n\n## Installation\n\n### Automated Installation (Recommended)\n\nThe tool includes an automated dependency installer that handles all required tools:\n\n```bash\n# Install the package\npip install lu77U-MobileSec\n\n# Run system doctor to install missing dependencies\nlu77u-mobilesec doctor\n\n# Start analyzing APKs\nlu77u-mobilesec your-app.apk\n```\n\n### Manual Setup by Platform\n\n**macOS**\n```bash\n# Using Homebrew\nbrew install jadx node openjdk apktool\n\n# Install Python package\npip install lu77U-MobileSec\n```\n\n**Linux (Ubuntu/Debian)**\n```bash\n# Install system dependencies\nsudo apt update\nsudo apt install openjdk-11-jdk nodejs npm\n\n# Download and install JADX\nwget https://github.com/skylot/jadx/releases/latest/download/jadx-1.4.7.zip\nunzip jadx-1.4.7.zip -d /opt/jadx\nsudo ln -s /opt/jadx/bin/jadx /usr/local/bin/jadx\n\n# Install Python package\npip install lu77U-MobileSec\n```\n\n**Windows**\n```powershell\n# Using Chocolatey\nchoco install openjdk nodejs\n\n# Download JADX and APKTool from GitHub releases\n# Add to PATH manually\n\n# Install Python package\npip install lu77U-MobileSec\n```\n\n### Core Dependencies\n\n- **Python 3.8+**: Main runtime environment\n- **JADX**: Java/Kotlin decompiler for Android apps \n- **Java 11+**: Required for Android build tools\n- **Node.js**: Required for React Native enhanced analysis\n- **APKTool**: APK resource extraction and analysis\n\n### Optional Dependencies\n\n- **MobSF**: Dynamic analysis platform\n- **Ollama**: Local LLM runtime for AI analysis\n- **Android SDK Tools**: aapt for manifest parsing\n- **Blutter**: Flutter Dart code recovery tool\n\n### AI Configuration\n\n**Groq API (Cloud)**\n```bash\n# Get API key from https://console.groq.com/\nexport GROQ_API_KEY=\"your-api-key-here\"\n```\n\n**Ollama (Local)**\n```bash\n# Install Ollama\ncurl -fsSL https://ollama.ai/install.sh | sh\n\n# Pull DeepSeek Coder model (automatically done by tool)\nollama pull deepseek-coder:6.7b\n```\n\n</details>\n\n<details>\n<summary>\ud83d\udcd6 Usage Guide</summary>\n\n## Usage\n\n### Basic Command Line Usage\n\n```bash\n# Basic analysis (auto-detect framework)\nlu77u-mobilesec app.apk\n\n# Force specific framework type\nlu77u-mobilesec app.apk --type react-native\n\n# Enable AI-powered vulnerability fixing\nlu77u-mobilesec app.apk --fix\n\n# Enable dynamic analysis (requires MobSF)\nlu77u-mobilesec app.apk --dynamic\n\n# Enhanced React Native analysis\nlu77u-mobilesec app.apk --type react-native --enhanced-rn\n\n# Check system dependencies\nlu77u-mobilesec doctor\n\n# Show help\nlu77u-mobilesec --help\n```\n\n### Interactive Mode\n\nLaunch guided analysis with configuration options:\n\n```bash\n# Start interactive mode\nlu77u-mobilesec\n```\n\nInteractive mode provides:\n- **Framework Selection**: Choose analysis type manually\n- **AI Configuration**: Select between Groq and Ollama\n- **Dynamic Analysis Setup**: Configure MobSF integration \n- **Debug Mode**: Enable verbose logging\n- **Sample APK Access**: Built-in test applications\n\n### Complete CLI Reference\n\n**Arguments:**\n- `APK_FILE`: Path to Android APK file to analyze\n- `doctor`: Run system dependency checker and installer\n\n**Options:**\n- `--type {java,kotlin,react-native,flutter}`: Force specific analysis type\n- `--fix`: Enable vulnerability auto-fix prompt after analysis\n- `--dynamic`: Enable dynamic analysis using MobSF API\n- `--enhanced-rn`: Use enhanced React Native analysis with decompilation\n- `--llm {groq,ollama}`: Choose AI model provider (default: ollama)\n- `--debug, -d`: Enable debug mode with verbose output\n- `--version, -v`: Show program version and exit\n- `--help, -h`: Show help message and exit\n\n**Advanced Examples:**\n```bash\n# Full analysis with all features\nlu77u-mobilesec app.apk --fix --dynamic --debug\n\n# React Native with enhanced decompilation\nlu77u-mobilesec app.apk --type react-native --enhanced-rn --fix\n\n# Use Groq AI for analysis\nlu77u-mobilesec app.apk --llm groq --fix\n\n# Flutter analysis with debug output\nlu77u-mobilesec app.apk --type flutter --debug --fix\n```\n\n</details>\n\n<details>\n<summary>\ud83d\udd0d Analysis Capabilities</summary>\n\n## Framework-Specific Analysis\n\n### Java/Kotlin Analysis\n\n**Decompilation & Extraction:**\n- **JADX Integration**: Full source code reconstruction from APK\n- **Manifest Analysis**: Permission and component inspection\n- **Resource Extraction**: Assets, strings, configuration files\n- **DEX Analysis**: Dalvik bytecode processing\n\n**Security Scanning:**\n- **Code Pattern Detection**: Custom vulnerability rules\n- **API Usage Analysis**: Android framework and library calls\n- **Component Security**: Activity, Service, BroadcastReceiver analysis\n- **Permission Analysis**: Dangerous permission usage patterns\n\n**AI Integration:**\n- **Context-Aware Analysis**: Understanding of Android architecture\n- **Vulnerability Categorization**: Automatic classification and severity scoring\n- **Fix Generation**: AI-generated patches for detected issues\n\n### React Native Analysis\n\n**Standard Analysis:**\n- **Bundle Extraction**: JavaScript bundle identification and extraction\n- **Bridge Analysis**: Native module interaction patterns\n- **Component Scanning**: React component security assessment\n- **Storage Analysis**: AsyncStorage and secure storage patterns\n\n**Enhanced Analysis (--enhanced-rn):**\n- **Bundle Decompilation**: Converts minified bundles back to readable modules\n- **Module-Level Analysis**: Individual React Native module examination\n- **Advanced Pattern Detection**: Bridge vulnerabilities, injection flaws\n- **react-native-decompiler Integration**: Automatic tool installation and usage\n\n**Supported Bundle Types:**\n- `index.android.bundle`\n- `main.jsbundle`\n- Custom bundle configurations\n- Hermes bytecode bundles\n\n### Flutter Analysis\n\n**Blutter Integration:**\n- **Dart Code Recovery**: Extract Dart source from Flutter APK\n- **Snapshot Analysis**: Dart VM snapshot processing\n- **Asset Extraction**: Flutter-specific resource analysis\n\n**Security Patterns:**\n- **Widget Security**: Flutter widget vulnerability patterns\n- **Platform Channel Analysis**: Native bridge security assessment\n- **Engine Integration**: Flutter engine security evaluation\n\n</details>\n\n<details>\n<summary>\ud83d\ude80 Dynamic Analysis (MobSF Integration)</summary>\n\n## MobSF Dynamic Analysis\n\n### Setup Requirements\n\n1. **Install MobSF Server:**\n```bash\n# Clone and setup MobSF\ngit clone https://github.com/MobSF/Mobile-Security-Framework-MobSF.git\ncd Mobile-Security-Framework-MobSF\n./setup.sh\n```\n\n2. **Start MobSF Server:**\n```bash\n# Start server (usually http://localhost:8000)\npython manage.py runserver\n```\n\n3. **Get API Key:**\n- Access MobSF web interface\n- Navigate to API Key section\n- Generate and copy API key\n\n### Dynamic Analysis Workflow\n\n```bash\n# Run with dynamic analysis\nlu77u-mobilesec app.apk --dynamic\n```\n\n**Analysis Process:**\n1. **APK Upload**: Automatic upload to MobSF server\n2. **Static Analysis**: MobSF performs initial static scan\n3. **Dynamic Setup**: Configures testing environment\n4. **Runtime Testing**: Monitors application behavior\n5. **Report Generation**: Combines static and dynamic results\n\n### Dynamic Analysis Features\n\n**Real-time Monitoring:**\n- **Network Traffic**: HTTP/HTTPS request monitoring\n- **File System Access**: Runtime file operation tracking\n- **Component Interaction**: Activity and service behavior\n- **API Endpoint Discovery**: Automatic endpoint detection\n\n**Security Testing:**\n- **SSL/TLS Validation**: Certificate and encryption analysis\n- **Authentication Testing**: Session management evaluation\n- **Input Validation**: Runtime injection testing\n- **Permission Usage**: Runtime permission analysis\n\n**Integration Benefits:**\n- **Combined Results**: Static + dynamic vulnerability correlation\n- **Behavioral Context**: Understanding of application runtime behavior\n- **Network Security**: Comprehensive communication analysis\n- **False Positive Reduction**: Dynamic validation of static findings\n\n</details>\n\n<details>\n<summary>\ud83e\udd16 AI-Powered Analysis</summary>\n\n## AI Integration & Capabilities\n\n### Groq API Integration\n\n**Features:**\n- **Cloud-based Processing**: High-performance LLM analysis\n- **Real-time Analysis**: Fast vulnerability detection and fix generation\n- **Latest Models**: Access to cutting-edge language models\n- **Scalable**: Handles large codebases efficiently\n\n**Setup:**\n```bash\n# Set API key\nexport GROQ_API_KEY=\"your-groq-api-key\"\n\n# Use Groq for analysis\nlu77u-mobilesec app.apk --llm groq --fix\n```\n\n### Ollama Integration (Local LLM)\n\n**Features:**\n- **Privacy-focused**: All analysis runs locally\n- **DeepSeek Coder Model**: Specialized for code analysis\n- **Offline Operation**: No internet required after setup\n- **Cost-effective**: No API usage fees\n\n**Setup:**\n```bash\n# Ollama installation (automatic via tool)\n# Model download (automatic on first use)\n\n# Use Ollama (default)\nlu77u-mobilesec app.apk --fix\n```\n\n### AI Analysis Capabilities\n\n**Vulnerability Detection:**\n- **Pattern Recognition**: Advanced code pattern analysis\n- **Context Understanding**: Business logic comprehension\n- **Semantic Analysis**: Meaning-based vulnerability detection\n- **False Positive Filtering**: Intelligent result filtering\n\n**Fix Generation:**\n- **Automated Patching**: AI-generated code fixes\n- **Context-aware Solutions**: Fixes that understand application architecture\n- **Multiple Fix Options**: Alternative solutions for complex issues\n- **Explanation Generation**: Detailed fix rationale and implementation\n\n**Severity Assessment:**\n- **CVSS Integration**: Standard vulnerability scoring\n- **Context-based Scoring**: Application-specific risk assessment\n- **Business Impact Analysis**: Understanding of security implications\n- **Prioritization Guidance**: Risk-based fix ordering\n\n</details>\n\n<details>\n<summary>\ud83d\udcca Output Structure & Reporting</summary>\n\n## Analysis Results Organization\n\n### Output Directory Structure\n\n```\nWorks/\n\u251c\u2500\u2500 {apk_name}_{timestamp}/\n\u2502 \u251c\u2500\u2500 Dynamic Analysis/ # MobSF dynamic analysis results\n\u2502 \u2502 \u251c\u2500\u2500 mobsf_report.json # Complete MobSF analysis\n\u2502 \u2502 \u251c\u2500\u2500 network_traffic.json # Network monitoring data\n\u2502 \u2502 \u2514\u2500\u2500 runtime_analysis.json # Behavioral analysis\n\u2502 \u251c\u2500\u2500 Files Processed for Working/ # Extracted and processed files\n\u2502 \u2502 \u251c\u2500\u2500 decompiled/ # JADX/Blutter output\n\u2502 \u2502 \u251c\u2500\u2500 resources/ # Extracted resources\n\u2502 \u2502 \u2514\u2500\u2500 manifest/ # Manifest analysis\n\u2502 \u251c\u2500\u2500 Fixes Requested/ # AI-generated vulnerability fixes\n\u2502 \u2502 \u251c\u2500\u2500 vulnerability_fixes.json # Structured fix data\n\u2502 \u2502 \u2514\u2500\u2500 fix_code/ # Generated code patches\n\u2502 \u251c\u2500\u2500 Prompts Given to AI/ # AI analysis prompts\n\u2502 \u2502 \u2514\u2500\u2500 analysis_prompts.txt # Sent prompts for transparency\n\u2502 \u2514\u2500\u2500 Response By AI/ # AI analysis responses\n\u2502 \u251c\u2500\u2500 vulnerability_analysis.json\n\u2502 \u2514\u2500\u2500 detailed_responses.txt\n```\n\n### Report Types\n\n**Vulnerability Summary:**\n- High-level security assessment\n- Risk categorization and scoring\n- Executive summary of findings\n- Remediation priority matrix\n\n**Detailed Analysis:**\n- File-by-file vulnerability breakdown\n- Code snippets with vulnerability context\n- Technical explanation of security issues\n- Line-by-line analysis results\n\n**Fix Recommendations:**\n- AI-generated patch suggestions\n- Implementation guidance\n- Alternative solution approaches\n- Testing recommendations\n\n**Dynamic Results (if enabled):**\n- Runtime behavior analysis\n- Network traffic security assessment\n- Component interaction patterns\n- Real-time vulnerability validation\n\n### File Formats\n\n**JSON Format:**\n- Structured data for integration\n- Machine-readable vulnerability data\n- API-friendly format for automation\n- Standard vulnerability schema\n\n**Human-readable Reports:**\n- Clear vulnerability descriptions\n- Step-by-step fix instructions\n- Code examples and explanations\n- Executive summaries\n\n**Generated Code:**\n- Ready-to-use patch files\n- Commented fix implementations\n- Alternative solution approaches\n- Integration instructions\n\n</details>\n\n<details>\n<summary>\ud83d\udd27 Advanced Configuration</summary>\n\n## Framework-Specific Configuration\n\n### React Native Enhanced Analysis\n\n**Prerequisites:**\n- Node.js (v14+) and npm\n- Internet connection for tool installation\n\n**Enhanced Features:**\n```bash\n# Enable enhanced analysis\nlu77u-mobilesec app.apk --type react-native --enhanced-rn\n```\n\n**Capabilities:**\n- **Bundle Decompilation**: Converts minified JavaScript to readable code\n- **Module Resolution**: Individual React Native module analysis\n- **Advanced Patterns**: Bridge vulnerability detection\n- **Context Preservation**: Maintains function and component context\n\n**Tool Integration:**\n- **react-native-decompiler**: Automatic installation and usage\n- **Bundle Processing**: Support for multiple bundle formats\n- **Source Map Support**: When available, uses source maps for accuracy\n\n### Flutter Analysis Configuration\n\n**Blutter Integration:**\n- **Automatic Setup**: Tool handles Blutter installation\n- **Dart Recovery**: Extracts Dart source from compiled Flutter apps\n- **Asset Processing**: Flutter-specific resource extraction\n\n### Java/Kotlin Analysis Options\n\n**JADX Configuration:**\n- **Decompilation Options**: Optimized settings for security analysis\n- **Resource Extraction**: Complete APK content extraction\n- **Multi-threading**: Parallel processing for large APKs\n\n### MobSF Configuration\n\n**Server Setup:**\n```bash\n# Custom MobSF server URL\nexport MOBSF_URL=\"http://your-mobsf-server:8000\"\n\n# API key configuration\nexport MOBSF_API_KEY=\"your-api-key\"\n```\n\n**Analysis Options:**\n- **Static + Dynamic**: Combined analysis mode\n- **Dynamic Only**: Runtime-focused testing\n- **Custom Timeout**: Configurable analysis duration\n\n</details>\n\n<details>\n<summary>\ud83d\udc1b Troubleshooting</summary>\n\n## Common Issues & Solutions\n\n### Installation Issues\n\n**Problem: JADX not found**\n```bash\n# macOS\nbrew install jadx\n\n# Linux - Download from releases\nwget https://github.com/skylot/jadx/releases/latest/download/jadx-1.4.7.zip\nunzip jadx-1.4.7.zip -d /opt/jadx\nsudo ln -s /opt/jadx/bin/jadx /usr/local/bin/jadx\n\n# Windows - Download and add to PATH\n```\n\n**Problem: Node.js required for React Native**\n```bash\n# macOS\nbrew install node\n\n# Linux\nsudo apt install nodejs npm\n\n# Windows\nchoco install nodejs\n```\n\n**Problem: Java not found**\n```bash\n# Install OpenJDK 11+\nbrew install openjdk@11 # macOS\nsudo apt install openjdk-11-jdk # Linux\nchoco install openjdk # Windows\n```\n\n### Analysis Issues\n\n**Problem: APK parsing errors**\n- Verify APK file integrity\n- Check file permissions (readable)\n- Use `--debug` flag for detailed error information\n- Ensure APK is a valid Android application\n\n**Problem: Decompilation failures**\n- Large APKs may require more memory\n- Corrupted APKs cannot be processed\n- Some obfuscated APKs may have limited decompilation success\n- Try different analysis types if auto-detection fails\n\n**Problem: Framework detection issues**\n- Use `--type` flag to force specific framework\n- Check if APK contains expected framework files\n- Some hybrid apps may need manual type specification\n\n### MobSF Integration Issues\n\n**Problem: MobSF connection fails**\n- Verify MobSF server is running (`http://localhost:8000`)\n- Check API key is correct\n- Ensure network connectivity to MobSF server\n- Verify MobSF version compatibility\n\n**Problem: Dynamic analysis timeout**\n- Increase timeout in MobSF settings\n- Check device/emulator connectivity\n- Ensure sufficient system resources\n\n### AI Issues\n\n**Problem: Groq API errors**\n- Verify `GROQ_API_KEY` environment variable\n- Check internet connectivity\n- Ensure API quota is available\n- Validate API key permissions\n\n**Problem: Ollama not responding**\n- Check if Ollama service is running: `ollama list`\n- Verify DeepSeek Coder model: `ollama pull deepseek-coder:6.7b`\n- Restart Ollama service: `ollama serve`\n- Check system resources (RAM requirements)\n\n**Problem: AI analysis slow**\n- For Groq: Check internet speed and API limits\n- For Ollama: Ensure sufficient RAM (8GB+ recommended)\n- Use `--debug` to monitor analysis progress\n\n### Performance Issues\n\n**Problem: Long analysis times**\n- Large APKs require more processing time\n- Dynamic analysis adds significant time\n- Enhanced React Native analysis is slower but more accurate\n- Use selective analysis types for faster results\n\n**Problem: Memory issues**\n- Increase Java heap size for JADX\n- Close other applications during analysis\n- Use 64-bit Java installation\n- Consider analyzing smaller APK subsets\n\n### File Permission Issues\n\n**Problem: Cannot write output files**\n- Check write permissions in current directory\n- Ensure sufficient disk space\n- Verify user permissions for output location\n\n</details>\n\n<details>\n<summary>\ud83e\udd1d Contributing</summary>\n\n## Development & Contributions\n\n### Development Setup\n\n```bash\n# Clone repository\ngit clone https://github.com/sam-mg/lu77U-MobileSec.git\ncd lu77U-MobileSec\n\n# Create virtual environment\npython -m venv venv\nsource venv/bin/activate # Linux/macOS\n# or\nvenv\\Scripts\\activate # Windows\n\n# Install in development mode\npip install -e .\n\n# Install development dependencies\npip install -e \".[dev]\"\n\n# Run tests\npytest\n\n# Run linting\nflake8 lu77u_mobilesec/\nblack lu77u_mobilesec/\nmypy lu77u_mobilesec/\n```\n\n### Code Style & Standards\n\n- **Black**: Code formatting (line length: 88)\n- **Flake8**: Linting and style checking\n- **MyPy**: Static type checking\n- **Pytest**: Unit and integration testing\n\n### Project Structure\n\n```\nlu77u_mobilesec/\n\u251c\u2500\u2500 ai/ # AI provider integrations\n\u2502 \u251c\u2500\u2500 processors/ # AI analysis processors\n\u2502 \u2514\u2500\u2500 providers/ # Groq, Ollama implementations\n\u251c\u2500\u2500 cli/ # Command-line interface\n\u251c\u2500\u2500 constants/ # Framework definitions, patterns\n\u251c\u2500\u2500 core/ # Core analysis engine\n\u2502 \u251c\u2500\u2500 analyzers/ # Framework-specific analyzers\n\u2502 \u2514\u2500\u2500 detectors/ # Framework detection logic\n\u251c\u2500\u2500 system/ # System validation and setup\n\u251c\u2500\u2500 tools/ # External tool integrations\n\u2502 \u251c\u2500\u2500 android_tools/ # Android SDK utilities\n\u2502 \u251c\u2500\u2500 decompilers/ # JADX, Blutter, RN decompiler\n\u2502 \u2514\u2500\u2500 mobsf_scripts/ # MobSF API integration\n\u2514\u2500\u2500 utils/ # Utility functions\n \u251c\u2500\u2500 config/ # Configuration management\n \u251c\u2500\u2500 file_system/ # File operations\n \u2514\u2500\u2500 helpers/ # Helper functions\n```\n\n### Contributing Guidelines\n\n1. **Fork the Repository**\n - Create personal fork on GitHub\n - Clone fork locally for development\n\n2. **Create Feature Branch**\n ```bash\n git checkout -b feature/amazing-feature\n ```\n\n3. **Make Changes**\n - Follow existing code style\n - Add tests for new functionality\n - Update documentation as needed\n\n4. **Test Changes**\n ```bash\n # Run tests\n pytest\n\n # Run linting\n flake8 lu77u_mobilesec/\n black lu77u_mobilesec/ --check\n\n # Type checking\n mypy lu77u_mobilesec/\n ```\n\n5. **Commit Changes**\n ```bash\n git add .\n git commit -m \"Add amazing feature\"\n ```\n\n6. **Push to Branch**\n ```bash\n git push origin feature/amazing-feature\n ```\n\n7. **Open Pull Request**\n - Provide clear description of changes\n - Reference any related issues\n - Ensure CI checks pass\n\n### Areas for Contribution\n\n**New Framework Support:**\n- Xamarin applications\n- Ionic/Cordova apps\n- Unity mobile games\n- Progressive Web Apps (PWA)\n\n**Vulnerability Patterns:**\n- Additional security detection rules\n- Framework-specific vulnerability patterns\n- OWASP Mobile Top 10 implementations\n- Custom vulnerability definitions\n\n**AI Integrations:**\n- Additional LLM providers (OpenAI, Anthropic)\n- Custom model fine-tuning\n- Specialized security models\n- Local model optimizations\n\n**Tool Integrations:**\n- Additional decompilers\n- Static analysis tools\n- Dynamic analysis platforms\n- CI/CD pipeline integrations\n\n**Documentation:**\n- Tutorial content\n- Video guides\n- Translations\n- Best practices guides\n\n**Testing:**\n- Expanded test coverage\n- Performance benchmarks\n- Integration test scenarios\n- Sample APK creation\n\n### Development Tips\n\n- Use `--debug` flag extensively during development\n- Test with various APK types and sizes\n- Ensure cross-platform compatibility\n- Add logging for debugging complex issues\n- Follow existing error handling patterns\n\n</details>\n\n## \ud83d\udcc4 License\n\nThis project is licensed under the Apache License 2.0 - see the [LICENSE](LICENSE) file for details.\n\n## \ud83d\udc68\u200d\ud83d\udcbb Author\n\n**Sam MG Harish (lu77_u)**\n- Email: sammgharish@gmail.com\n- GitHub: [@sam-mg](https://github.com/sam-mg)\n\n---\n\n## \u2b50 Support\n\nIf you find this tool helpful, please consider:\n- \u2b50 Starring the repository\n- \ud83d\udc1b Reporting bugs and issues\n- \ud83d\udca1 Suggesting new features\n- \ud83e\udd1d Contributing to the project\n\n<p align=\"right\">\n <img src=\"https://wakatime.com/badge/user/f5bf5341-405c-480f-bd76-40a5c1a8ada9/project/f2697ac6-8530-46a0-ae2c-01eb4f730bdb.svg?style=for-the-badge\"/>\n</p>\n",
"bugtrack_url": null,
"license": null,
"summary": "Professional mobile security analysis and vulnerability patching tool for Android applications with AI-powered detection and automated fix generation",
"version": "1.0.1",
"project_urls": {
"Documentation": "https://github.com/sam-mg/lu77U-MobileSec/wiki",
"Homepage": "https://github.com/sam-mg/lu77U-MobileSec",
"Issues": "https://github.com/sam-mg/lu77U-MobileSec/issues",
"Repository": "https://github.com/sam-mg/lu77U-MobileSec"
},
"split_keywords": [
"mobile-security",
" apk-analysis",
" android-security",
" vulnerability-detection",
" security-patches",
" pentesting",
" mobile-app-security",
" automated-fixes",
" lu77u"
],
"urls": [
{
"comment_text": null,
"digests": {
"blake2b_256": "95ddff55b31ee21f8cddd4fcc6ce26383e3e673ae0c6653a67846e8ca6f2f3a0",
"md5": "6e8f4fec8c2d9bbd104e93fe02975e97",
"sha256": "01fe65f5a96ef2bc9d78b269d76b6348efc3188166bb60053b07f0ddabd6cfc9"
},
"downloads": -1,
"filename": "lu77u_mobilesec-1.0.1-py3-none-any.whl",
"has_sig": false,
"md5_digest": "6e8f4fec8c2d9bbd104e93fe02975e97",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.13",
"size": 186737,
"upload_time": "2025-07-09T06:53:14",
"upload_time_iso_8601": "2025-07-09T06:53:14.383515Z",
"url": "https://files.pythonhosted.org/packages/95/dd/ff55b31ee21f8cddd4fcc6ce26383e3e673ae0c6653a67846e8ca6f2f3a0/lu77u_mobilesec-1.0.1-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": null,
"digests": {
"blake2b_256": "53bcebd92f8447194901fbe5c7c641ee77aa8b7c50b6c2d87200fadce10e792f",
"md5": "3d72f97f882d2b6903751c591577e151",
"sha256": "399b58e8324e06f59106998ca29b35e0801cc7e9218ca9ee5b9fa671a71ba651"
},
"downloads": -1,
"filename": "lu77u_mobilesec-1.0.1.tar.gz",
"has_sig": false,
"md5_digest": "3d72f97f882d2b6903751c591577e151",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.13",
"size": 179382,
"upload_time": "2025-07-09T06:53:15",
"upload_time_iso_8601": "2025-07-09T06:53:15.649799Z",
"url": "https://files.pythonhosted.org/packages/53/bc/ebd92f8447194901fbe5c7c641ee77aa8b7c50b6c2d87200fadce10e792f/lu77u_mobilesec-1.0.1.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-07-09 06:53:15",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "sam-mg",
"github_project": "lu77U-MobileSec",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"requirements": [
{
"name": "groq",
"specs": [
[
">=",
"0.4.0"
]
]
},
{
"name": "requests",
"specs": [
[
">=",
"2.25.0"
]
]
},
{
"name": "requests-toolbelt",
"specs": [
[
">=",
"0.9.1"
]
]
},
{
"name": "aiohttp",
"specs": [
[
">=",
"3.8.0"
]
]
},
{
"name": "httpx",
"specs": [
[
">=",
"0.24.0"
]
]
},
{
"name": "zipfile36",
"specs": [
[
">=",
"0.1.3"
]
]
},
{
"name": "xmltodict",
"specs": [
[
">=",
"0.13.0"
]
]
},
{
"name": "lxml",
"specs": [
[
">=",
"4.9.0"
]
]
},
{
"name": "jsonschema",
"specs": [
[
">=",
"4.0.0"
]
]
},
{
"name": "pyyaml",
"specs": [
[
">=",
"6.0"
]
]
},
{
"name": "python-magic",
"specs": [
[
">=",
"0.4.27"
]
]
},
{
"name": "psutil",
"specs": [
[
">=",
"5.8.0"
]
]
},
{
"name": "click",
"specs": [
[
">=",
"8.0.0"
]
]
},
{
"name": "rich",
"specs": [
[
">=",
"13.0.0"
]
]
},
{
"name": "colorama",
"specs": [
[
">=",
"0.4.6"
]
]
},
{
"name": "cryptography",
"specs": [
[
">=",
"3.4.8"
]
]
}
],
"lcname": "lu77u-mobilesec"
}