lu77U-MobileSec


Namelu77U-MobileSec JSON
Version 1.0.1 PyPI version JSON
download
home_pagehttps://github.com/sam-mg/lu77U-MobileSec
SummaryProfessional mobile security analysis and vulnerability patching tool for Android applications with AI-powered detection and automated fix generation
upload_time2025-07-09 06:53:15
maintainerNone
docs_urlNone
authorSam MG Harish (lu77_u)
requires_python>=3.13
licenseNone
keywords mobile-security apk-analysis android-security vulnerability-detection security-patches pentesting mobile-app-security automated-fixes lu77u
VCS
bugtrack_url
requirements groq requests requests-toolbelt aiohttp httpx zipfile36 xmltodict lxml jsonschema pyyaml python-magic psutil click rich colorama cryptography
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # lu77U-MobileSec

**🛡️ Professional Mobile Security Analysis & Vulnerability Patching Tool 🔐**

An advanced, AI-powered security analysis platform for Android applications with automatic vulnerability detection and intelligent fix generation. Supports Java/Kotlin, React Native, and Flutter frameworks with comprehensive static and dynamic analysis capabilities.

## ⭐ Key Features

- **🔍 Multi-Framework Support**: Java/Kotlin, React Native, Flutter with specialized analyzers
- **🤖 AI-Powered Analysis**: Groq API and Ollama integration for intelligent vulnerability detection
- **🚀 Dynamic Analysis**: MobSF integration for real-time application testing
- **📊 Comprehensive Reporting**: Structured output with severity scoring and fix recommendations
- **🛠️ Automated Setup**: Built-in dependency installer and system doctor
- **💻 Interactive CLI**: User-friendly interface with guided analysis workflows

<details>
<summary>🔧 Installation & Setup</summary>

## Installation

### Automated Installation (Recommended)

The tool includes an automated dependency installer that handles all required tools:

```bash
# Install the package
pip install lu77U-MobileSec

# Run system doctor to install missing dependencies
lu77u-mobilesec doctor

# Start analyzing APKs
lu77u-mobilesec your-app.apk
```

### Manual Setup by Platform

**macOS**
```bash
# Using Homebrew
brew install jadx node openjdk apktool

# Install Python package
pip install lu77U-MobileSec
```

**Linux (Ubuntu/Debian)**
```bash
# Install system dependencies
sudo apt update
sudo apt install openjdk-11-jdk nodejs npm

# Download and install JADX
wget https://github.com/skylot/jadx/releases/latest/download/jadx-1.4.7.zip
unzip jadx-1.4.7.zip -d /opt/jadx
sudo ln -s /opt/jadx/bin/jadx /usr/local/bin/jadx

# Install Python package
pip install lu77U-MobileSec
```

**Windows**
```powershell
# Using Chocolatey
choco install openjdk nodejs

# Download JADX and APKTool from GitHub releases
# Add to PATH manually

# Install Python package
pip install lu77U-MobileSec
```

### Core Dependencies

- **Python 3.8+**: Main runtime environment
- **JADX**: Java/Kotlin decompiler for Android apps  
- **Java 11+**: Required for Android build tools
- **Node.js**: Required for React Native enhanced analysis
- **APKTool**: APK resource extraction and analysis

### Optional Dependencies

- **MobSF**: Dynamic analysis platform
- **Ollama**: Local LLM runtime for AI analysis
- **Android SDK Tools**: aapt for manifest parsing
- **Blutter**: Flutter Dart code recovery tool

### AI Configuration

**Groq API (Cloud)**
```bash
# Get API key from https://console.groq.com/
export GROQ_API_KEY="your-api-key-here"
```

**Ollama (Local)**
```bash
# Install Ollama
curl -fsSL https://ollama.ai/install.sh | sh

# Pull DeepSeek Coder model (automatically done by tool)
ollama pull deepseek-coder:6.7b
```

</details>

<details>
<summary>📖 Usage Guide</summary>

## Usage

### Basic Command Line Usage

```bash
# Basic analysis (auto-detect framework)
lu77u-mobilesec app.apk

# Force specific framework type
lu77u-mobilesec app.apk --type react-native

# Enable AI-powered vulnerability fixing
lu77u-mobilesec app.apk --fix

# Enable dynamic analysis (requires MobSF)
lu77u-mobilesec app.apk --dynamic

# Enhanced React Native analysis
lu77u-mobilesec app.apk --type react-native --enhanced-rn

# Check system dependencies
lu77u-mobilesec doctor

# Show help
lu77u-mobilesec --help
```

### Interactive Mode

Launch guided analysis with configuration options:

```bash
# Start interactive mode
lu77u-mobilesec
```

Interactive mode provides:
- **Framework Selection**: Choose analysis type manually
- **AI Configuration**: Select between Groq and Ollama
- **Dynamic Analysis Setup**: Configure MobSF integration  
- **Debug Mode**: Enable verbose logging
- **Sample APK Access**: Built-in test applications

### Complete CLI Reference

**Arguments:**
- `APK_FILE`: Path to Android APK file to analyze
- `doctor`: Run system dependency checker and installer

**Options:**
- `--type {java,kotlin,react-native,flutter}`: Force specific analysis type
- `--fix`: Enable vulnerability auto-fix prompt after analysis
- `--dynamic`: Enable dynamic analysis using MobSF API
- `--enhanced-rn`: Use enhanced React Native analysis with decompilation
- `--llm {groq,ollama}`: Choose AI model provider (default: ollama)
- `--debug, -d`: Enable debug mode with verbose output
- `--version, -v`: Show program version and exit
- `--help, -h`: Show help message and exit

**Advanced Examples:**
```bash
# Full analysis with all features
lu77u-mobilesec app.apk --fix --dynamic --debug

# React Native with enhanced decompilation
lu77u-mobilesec app.apk --type react-native --enhanced-rn --fix

# Use Groq AI for analysis
lu77u-mobilesec app.apk --llm groq --fix

# Flutter analysis with debug output
lu77u-mobilesec app.apk --type flutter --debug --fix
```

</details>

<details>
<summary>🔍 Analysis Capabilities</summary>

## Framework-Specific Analysis

### Java/Kotlin Analysis

**Decompilation & Extraction:**
- **JADX Integration**: Full source code reconstruction from APK
- **Manifest Analysis**: Permission and component inspection
- **Resource Extraction**: Assets, strings, configuration files
- **DEX Analysis**: Dalvik bytecode processing

**Security Scanning:**
- **Code Pattern Detection**: Custom vulnerability rules
- **API Usage Analysis**: Android framework and library calls
- **Component Security**: Activity, Service, BroadcastReceiver analysis
- **Permission Analysis**: Dangerous permission usage patterns

**AI Integration:**
- **Context-Aware Analysis**: Understanding of Android architecture
- **Vulnerability Categorization**: Automatic classification and severity scoring
- **Fix Generation**: AI-generated patches for detected issues

### React Native Analysis

**Standard Analysis:**
- **Bundle Extraction**: JavaScript bundle identification and extraction
- **Bridge Analysis**: Native module interaction patterns
- **Component Scanning**: React component security assessment
- **Storage Analysis**: AsyncStorage and secure storage patterns

**Enhanced Analysis (--enhanced-rn):**
- **Bundle Decompilation**: Converts minified bundles back to readable modules
- **Module-Level Analysis**: Individual React Native module examination
- **Advanced Pattern Detection**: Bridge vulnerabilities, injection flaws
- **react-native-decompiler Integration**: Automatic tool installation and usage

**Supported Bundle Types:**
- `index.android.bundle`
- `main.jsbundle`
- Custom bundle configurations
- Hermes bytecode bundles

### Flutter Analysis

**Blutter Integration:**
- **Dart Code Recovery**: Extract Dart source from Flutter APK
- **Snapshot Analysis**: Dart VM snapshot processing
- **Asset Extraction**: Flutter-specific resource analysis

**Security Patterns:**
- **Widget Security**: Flutter widget vulnerability patterns
- **Platform Channel Analysis**: Native bridge security assessment
- **Engine Integration**: Flutter engine security evaluation

</details>

<details>
<summary>🚀 Dynamic Analysis (MobSF Integration)</summary>

## MobSF Dynamic Analysis

### Setup Requirements

1. **Install MobSF Server:**
```bash
# Clone and setup MobSF
git clone https://github.com/MobSF/Mobile-Security-Framework-MobSF.git
cd Mobile-Security-Framework-MobSF
./setup.sh
```

2. **Start MobSF Server:**
```bash
# Start server (usually http://localhost:8000)
python manage.py runserver
```

3. **Get API Key:**
- Access MobSF web interface
- Navigate to API Key section
- Generate and copy API key

### Dynamic Analysis Workflow

```bash
# Run with dynamic analysis
lu77u-mobilesec app.apk --dynamic
```

**Analysis Process:**
1. **APK Upload**: Automatic upload to MobSF server
2. **Static Analysis**: MobSF performs initial static scan
3. **Dynamic Setup**: Configures testing environment
4. **Runtime Testing**: Monitors application behavior
5. **Report Generation**: Combines static and dynamic results

### Dynamic Analysis Features

**Real-time Monitoring:**
- **Network Traffic**: HTTP/HTTPS request monitoring
- **File System Access**: Runtime file operation tracking
- **Component Interaction**: Activity and service behavior
- **API Endpoint Discovery**: Automatic endpoint detection

**Security Testing:**
- **SSL/TLS Validation**: Certificate and encryption analysis
- **Authentication Testing**: Session management evaluation
- **Input Validation**: Runtime injection testing
- **Permission Usage**: Runtime permission analysis

**Integration Benefits:**
- **Combined Results**: Static + dynamic vulnerability correlation
- **Behavioral Context**: Understanding of application runtime behavior
- **Network Security**: Comprehensive communication analysis
- **False Positive Reduction**: Dynamic validation of static findings

</details>

<details>
<summary>🤖 AI-Powered Analysis</summary>

## AI Integration & Capabilities

### Groq API Integration

**Features:**
- **Cloud-based Processing**: High-performance LLM analysis
- **Real-time Analysis**: Fast vulnerability detection and fix generation
- **Latest Models**: Access to cutting-edge language models
- **Scalable**: Handles large codebases efficiently

**Setup:**
```bash
# Set API key
export GROQ_API_KEY="your-groq-api-key"

# Use Groq for analysis
lu77u-mobilesec app.apk --llm groq --fix
```

### Ollama Integration (Local LLM)

**Features:**
- **Privacy-focused**: All analysis runs locally
- **DeepSeek Coder Model**: Specialized for code analysis
- **Offline Operation**: No internet required after setup
- **Cost-effective**: No API usage fees

**Setup:**
```bash
# Ollama installation (automatic via tool)
# Model download (automatic on first use)

# Use Ollama (default)
lu77u-mobilesec app.apk --fix
```

### AI Analysis Capabilities

**Vulnerability Detection:**
- **Pattern Recognition**: Advanced code pattern analysis
- **Context Understanding**: Business logic comprehension
- **Semantic Analysis**: Meaning-based vulnerability detection
- **False Positive Filtering**: Intelligent result filtering

**Fix Generation:**
- **Automated Patching**: AI-generated code fixes
- **Context-aware Solutions**: Fixes that understand application architecture
- **Multiple Fix Options**: Alternative solutions for complex issues
- **Explanation Generation**: Detailed fix rationale and implementation

**Severity Assessment:**
- **CVSS Integration**: Standard vulnerability scoring
- **Context-based Scoring**: Application-specific risk assessment
- **Business Impact Analysis**: Understanding of security implications
- **Prioritization Guidance**: Risk-based fix ordering

</details>

<details>
<summary>📊 Output Structure & Reporting</summary>

## Analysis Results Organization

### Output Directory Structure

```
Works/
├── {apk_name}_{timestamp}/
│   ├── Dynamic Analysis/              # MobSF dynamic analysis results
│   │   ├── mobsf_report.json         # Complete MobSF analysis
│   │   ├── network_traffic.json      # Network monitoring data
│   │   └── runtime_analysis.json     # Behavioral analysis
│   ├── Files Processed for Working/   # Extracted and processed files
│   │   ├── decompiled/               # JADX/Blutter output
│   │   ├── resources/                # Extracted resources
│   │   └── manifest/                 # Manifest analysis
│   ├── Fixes Requested/              # AI-generated vulnerability fixes
│   │   ├── vulnerability_fixes.json  # Structured fix data
│   │   └── fix_code/                 # Generated code patches
│   ├── Prompts Given to AI/          # AI analysis prompts
│   │   └── analysis_prompts.txt      # Sent prompts for transparency
│   └── Response By AI/               # AI analysis responses
│       ├── vulnerability_analysis.json
│       └── detailed_responses.txt
```

### Report Types

**Vulnerability Summary:**
- High-level security assessment
- Risk categorization and scoring
- Executive summary of findings
- Remediation priority matrix

**Detailed Analysis:**
- File-by-file vulnerability breakdown
- Code snippets with vulnerability context
- Technical explanation of security issues
- Line-by-line analysis results

**Fix Recommendations:**
- AI-generated patch suggestions
- Implementation guidance
- Alternative solution approaches
- Testing recommendations

**Dynamic Results (if enabled):**
- Runtime behavior analysis
- Network traffic security assessment
- Component interaction patterns
- Real-time vulnerability validation

### File Formats

**JSON Format:**
- Structured data for integration
- Machine-readable vulnerability data
- API-friendly format for automation
- Standard vulnerability schema

**Human-readable Reports:**
- Clear vulnerability descriptions
- Step-by-step fix instructions
- Code examples and explanations
- Executive summaries

**Generated Code:**
- Ready-to-use patch files
- Commented fix implementations
- Alternative solution approaches
- Integration instructions

</details>

<details>
<summary>🔧 Advanced Configuration</summary>

## Framework-Specific Configuration

### React Native Enhanced Analysis

**Prerequisites:**
- Node.js (v14+) and npm
- Internet connection for tool installation

**Enhanced Features:**
```bash
# Enable enhanced analysis
lu77u-mobilesec app.apk --type react-native --enhanced-rn
```

**Capabilities:**
- **Bundle Decompilation**: Converts minified JavaScript to readable code
- **Module Resolution**: Individual React Native module analysis
- **Advanced Patterns**: Bridge vulnerability detection
- **Context Preservation**: Maintains function and component context

**Tool Integration:**
- **react-native-decompiler**: Automatic installation and usage
- **Bundle Processing**: Support for multiple bundle formats
- **Source Map Support**: When available, uses source maps for accuracy

### Flutter Analysis Configuration

**Blutter Integration:**
- **Automatic Setup**: Tool handles Blutter installation
- **Dart Recovery**: Extracts Dart source from compiled Flutter apps
- **Asset Processing**: Flutter-specific resource extraction

### Java/Kotlin Analysis Options

**JADX Configuration:**
- **Decompilation Options**: Optimized settings for security analysis
- **Resource Extraction**: Complete APK content extraction
- **Multi-threading**: Parallel processing for large APKs

### MobSF Configuration

**Server Setup:**
```bash
# Custom MobSF server URL
export MOBSF_URL="http://your-mobsf-server:8000"

# API key configuration
export MOBSF_API_KEY="your-api-key"
```

**Analysis Options:**
- **Static + Dynamic**: Combined analysis mode
- **Dynamic Only**: Runtime-focused testing
- **Custom Timeout**: Configurable analysis duration

</details>

<details>
<summary>🐛 Troubleshooting</summary>

## Common Issues & Solutions

### Installation Issues

**Problem: JADX not found**
```bash
# macOS
brew install jadx

# Linux - Download from releases
wget https://github.com/skylot/jadx/releases/latest/download/jadx-1.4.7.zip
unzip jadx-1.4.7.zip -d /opt/jadx
sudo ln -s /opt/jadx/bin/jadx /usr/local/bin/jadx

# Windows - Download and add to PATH
```

**Problem: Node.js required for React Native**
```bash
# macOS
brew install node

# Linux
sudo apt install nodejs npm

# Windows
choco install nodejs
```

**Problem: Java not found**
```bash
# Install OpenJDK 11+
brew install openjdk@11    # macOS
sudo apt install openjdk-11-jdk    # Linux
choco install openjdk    # Windows
```

### Analysis Issues

**Problem: APK parsing errors**
- Verify APK file integrity
- Check file permissions (readable)
- Use `--debug` flag for detailed error information
- Ensure APK is a valid Android application

**Problem: Decompilation failures**
- Large APKs may require more memory
- Corrupted APKs cannot be processed
- Some obfuscated APKs may have limited decompilation success
- Try different analysis types if auto-detection fails

**Problem: Framework detection issues**
- Use `--type` flag to force specific framework
- Check if APK contains expected framework files
- Some hybrid apps may need manual type specification

### MobSF Integration Issues

**Problem: MobSF connection fails**
- Verify MobSF server is running (`http://localhost:8000`)
- Check API key is correct
- Ensure network connectivity to MobSF server
- Verify MobSF version compatibility

**Problem: Dynamic analysis timeout**
- Increase timeout in MobSF settings
- Check device/emulator connectivity
- Ensure sufficient system resources

### AI Issues

**Problem: Groq API errors**
- Verify `GROQ_API_KEY` environment variable
- Check internet connectivity
- Ensure API quota is available
- Validate API key permissions

**Problem: Ollama not responding**
- Check if Ollama service is running: `ollama list`
- Verify DeepSeek Coder model: `ollama pull deepseek-coder:6.7b`
- Restart Ollama service: `ollama serve`
- Check system resources (RAM requirements)

**Problem: AI analysis slow**
- For Groq: Check internet speed and API limits
- For Ollama: Ensure sufficient RAM (8GB+ recommended)
- Use `--debug` to monitor analysis progress

### Performance Issues

**Problem: Long analysis times**
- Large APKs require more processing time
- Dynamic analysis adds significant time
- Enhanced React Native analysis is slower but more accurate
- Use selective analysis types for faster results

**Problem: Memory issues**
- Increase Java heap size for JADX
- Close other applications during analysis
- Use 64-bit Java installation
- Consider analyzing smaller APK subsets

### File Permission Issues

**Problem: Cannot write output files**
- Check write permissions in current directory
- Ensure sufficient disk space
- Verify user permissions for output location

</details>

<details>
<summary>🤝 Contributing</summary>

## Development & Contributions

### Development Setup

```bash
# Clone repository
git clone https://github.com/sam-mg/lu77U-MobileSec.git
cd lu77U-MobileSec

# Create virtual environment
python -m venv venv
source venv/bin/activate  # Linux/macOS
# or
venv\Scripts\activate  # Windows

# Install in development mode
pip install -e .

# Install development dependencies
pip install -e ".[dev]"

# Run tests
pytest

# Run linting
flake8 lu77u_mobilesec/
black lu77u_mobilesec/
mypy lu77u_mobilesec/
```

### Code Style & Standards

- **Black**: Code formatting (line length: 88)
- **Flake8**: Linting and style checking
- **MyPy**: Static type checking
- **Pytest**: Unit and integration testing

### Project Structure

```
lu77u_mobilesec/
├── ai/                    # AI provider integrations
│   ├── processors/        # AI analysis processors
│   └── providers/         # Groq, Ollama implementations
├── cli/                   # Command-line interface
├── constants/             # Framework definitions, patterns
├── core/                  # Core analysis engine
│   ├── analyzers/         # Framework-specific analyzers
│   └── detectors/         # Framework detection logic
├── system/                # System validation and setup
├── tools/                 # External tool integrations
│   ├── android_tools/     # Android SDK utilities
│   ├── decompilers/       # JADX, Blutter, RN decompiler
│   └── mobsf_scripts/     # MobSF API integration
└── utils/                 # Utility functions
    ├── config/            # Configuration management
    ├── file_system/       # File operations
    └── helpers/           # Helper functions
```

### Contributing Guidelines

1. **Fork the Repository**
   - Create personal fork on GitHub
   - Clone fork locally for development

2. **Create Feature Branch**
   ```bash
   git checkout -b feature/amazing-feature
   ```

3. **Make Changes**
   - Follow existing code style
   - Add tests for new functionality
   - Update documentation as needed

4. **Test Changes**
   ```bash
   # Run tests
   pytest

   # Run linting
   flake8 lu77u_mobilesec/
   black lu77u_mobilesec/ --check

   # Type checking
   mypy lu77u_mobilesec/
   ```

5. **Commit Changes**
   ```bash
   git add .
   git commit -m "Add amazing feature"
   ```

6. **Push to Branch**
   ```bash
   git push origin feature/amazing-feature
   ```

7. **Open Pull Request**
   - Provide clear description of changes
   - Reference any related issues
   - Ensure CI checks pass

### Areas for Contribution

**New Framework Support:**
- Xamarin applications
- Ionic/Cordova apps
- Unity mobile games
- Progressive Web Apps (PWA)

**Vulnerability Patterns:**
- Additional security detection rules
- Framework-specific vulnerability patterns
- OWASP Mobile Top 10 implementations
- Custom vulnerability definitions

**AI Integrations:**
- Additional LLM providers (OpenAI, Anthropic)
- Custom model fine-tuning
- Specialized security models
- Local model optimizations

**Tool Integrations:**
- Additional decompilers
- Static analysis tools
- Dynamic analysis platforms
- CI/CD pipeline integrations

**Documentation:**
- Tutorial content
- Video guides
- Translations
- Best practices guides

**Testing:**
- Expanded test coverage
- Performance benchmarks
- Integration test scenarios
- Sample APK creation

### Development Tips

- Use `--debug` flag extensively during development
- Test with various APK types and sizes
- Ensure cross-platform compatibility
- Add logging for debugging complex issues
- Follow existing error handling patterns

</details>

## 📄 License

This project is licensed under the Apache License 2.0 - see the [LICENSE](LICENSE) file for details.

## 👨‍💻 Author

**Sam MG Harish (lu77_u)**
- Email: sammgharish@gmail.com
- GitHub: [@sam-mg](https://github.com/sam-mg)

---

## ⭐ Support

If you find this tool helpful, please consider:
- ⭐ Starring the repository
- 🐛 Reporting bugs and issues
- 💡 Suggesting new features
- 🤝 Contributing to the project

<p align="right">
    <img src="https://wakatime.com/badge/user/f5bf5341-405c-480f-bd76-40a5c1a8ada9/project/f2697ac6-8530-46a0-ae2c-01eb4f730bdb.svg?style=for-the-badge"/>
</p>

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/sam-mg/lu77U-MobileSec",
    "name": "lu77U-MobileSec",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.13",
    "maintainer_email": null,
    "keywords": "mobile-security, apk-analysis, android-security, vulnerability-detection, security-patches, pentesting, mobile-app-security, automated-fixes, lu77U",
    "author": "Sam MG Harish (lu77_u)",
    "author_email": "\"Sam MG Harish (lu77_u)\" <sammgharish@gmail.com>",
    "download_url": "https://files.pythonhosted.org/packages/53/bc/ebd92f8447194901fbe5c7c641ee77aa8b7c50b6c2d87200fadce10e792f/lu77u_mobilesec-1.0.1.tar.gz",
    "platform": null,
    "description": "# lu77U-MobileSec\n\n**\ud83d\udee1\ufe0f Professional Mobile Security Analysis & Vulnerability Patching Tool \ud83d\udd10**\n\nAn advanced, AI-powered security analysis platform for Android applications with automatic vulnerability detection and intelligent fix generation. Supports Java/Kotlin, React Native, and Flutter frameworks with comprehensive static and dynamic analysis capabilities.\n\n## \u2b50 Key Features\n\n- **\ud83d\udd0d Multi-Framework Support**: Java/Kotlin, React Native, Flutter with specialized analyzers\n- **\ud83e\udd16 AI-Powered Analysis**: Groq API and Ollama integration for intelligent vulnerability detection\n- **\ud83d\ude80 Dynamic Analysis**: MobSF integration for real-time application testing\n- **\ud83d\udcca Comprehensive Reporting**: Structured output with severity scoring and fix recommendations\n- **\ud83d\udee0\ufe0f Automated Setup**: Built-in dependency installer and system doctor\n- **\ud83d\udcbb Interactive CLI**: User-friendly interface with guided analysis workflows\n\n<details>\n<summary>\ud83d\udd27 Installation & Setup</summary>\n\n## Installation\n\n### Automated Installation (Recommended)\n\nThe tool includes an automated dependency installer that handles all required tools:\n\n```bash\n# Install the package\npip install lu77U-MobileSec\n\n# Run system doctor to install missing dependencies\nlu77u-mobilesec doctor\n\n# Start analyzing APKs\nlu77u-mobilesec your-app.apk\n```\n\n### Manual Setup by Platform\n\n**macOS**\n```bash\n# Using Homebrew\nbrew install jadx node openjdk apktool\n\n# Install Python package\npip install lu77U-MobileSec\n```\n\n**Linux (Ubuntu/Debian)**\n```bash\n# Install system dependencies\nsudo apt update\nsudo apt install openjdk-11-jdk nodejs npm\n\n# Download and install JADX\nwget https://github.com/skylot/jadx/releases/latest/download/jadx-1.4.7.zip\nunzip jadx-1.4.7.zip -d /opt/jadx\nsudo ln -s /opt/jadx/bin/jadx /usr/local/bin/jadx\n\n# Install Python package\npip install lu77U-MobileSec\n```\n\n**Windows**\n```powershell\n# Using Chocolatey\nchoco install openjdk nodejs\n\n# Download JADX and APKTool from GitHub releases\n# Add to PATH manually\n\n# Install Python package\npip install lu77U-MobileSec\n```\n\n### Core Dependencies\n\n- **Python 3.8+**: Main runtime environment\n- **JADX**: Java/Kotlin decompiler for Android apps  \n- **Java 11+**: Required for Android build tools\n- **Node.js**: Required for React Native enhanced analysis\n- **APKTool**: APK resource extraction and analysis\n\n### Optional Dependencies\n\n- **MobSF**: Dynamic analysis platform\n- **Ollama**: Local LLM runtime for AI analysis\n- **Android SDK Tools**: aapt for manifest parsing\n- **Blutter**: Flutter Dart code recovery tool\n\n### AI Configuration\n\n**Groq API (Cloud)**\n```bash\n# Get API key from https://console.groq.com/\nexport GROQ_API_KEY=\"your-api-key-here\"\n```\n\n**Ollama (Local)**\n```bash\n# Install Ollama\ncurl -fsSL https://ollama.ai/install.sh | sh\n\n# Pull DeepSeek Coder model (automatically done by tool)\nollama pull deepseek-coder:6.7b\n```\n\n</details>\n\n<details>\n<summary>\ud83d\udcd6 Usage Guide</summary>\n\n## Usage\n\n### Basic Command Line Usage\n\n```bash\n# Basic analysis (auto-detect framework)\nlu77u-mobilesec app.apk\n\n# Force specific framework type\nlu77u-mobilesec app.apk --type react-native\n\n# Enable AI-powered vulnerability fixing\nlu77u-mobilesec app.apk --fix\n\n# Enable dynamic analysis (requires MobSF)\nlu77u-mobilesec app.apk --dynamic\n\n# Enhanced React Native analysis\nlu77u-mobilesec app.apk --type react-native --enhanced-rn\n\n# Check system dependencies\nlu77u-mobilesec doctor\n\n# Show help\nlu77u-mobilesec --help\n```\n\n### Interactive Mode\n\nLaunch guided analysis with configuration options:\n\n```bash\n# Start interactive mode\nlu77u-mobilesec\n```\n\nInteractive mode provides:\n- **Framework Selection**: Choose analysis type manually\n- **AI Configuration**: Select between Groq and Ollama\n- **Dynamic Analysis Setup**: Configure MobSF integration  \n- **Debug Mode**: Enable verbose logging\n- **Sample APK Access**: Built-in test applications\n\n### Complete CLI Reference\n\n**Arguments:**\n- `APK_FILE`: Path to Android APK file to analyze\n- `doctor`: Run system dependency checker and installer\n\n**Options:**\n- `--type {java,kotlin,react-native,flutter}`: Force specific analysis type\n- `--fix`: Enable vulnerability auto-fix prompt after analysis\n- `--dynamic`: Enable dynamic analysis using MobSF API\n- `--enhanced-rn`: Use enhanced React Native analysis with decompilation\n- `--llm {groq,ollama}`: Choose AI model provider (default: ollama)\n- `--debug, -d`: Enable debug mode with verbose output\n- `--version, -v`: Show program version and exit\n- `--help, -h`: Show help message and exit\n\n**Advanced Examples:**\n```bash\n# Full analysis with all features\nlu77u-mobilesec app.apk --fix --dynamic --debug\n\n# React Native with enhanced decompilation\nlu77u-mobilesec app.apk --type react-native --enhanced-rn --fix\n\n# Use Groq AI for analysis\nlu77u-mobilesec app.apk --llm groq --fix\n\n# Flutter analysis with debug output\nlu77u-mobilesec app.apk --type flutter --debug --fix\n```\n\n</details>\n\n<details>\n<summary>\ud83d\udd0d Analysis Capabilities</summary>\n\n## Framework-Specific Analysis\n\n### Java/Kotlin Analysis\n\n**Decompilation & Extraction:**\n- **JADX Integration**: Full source code reconstruction from APK\n- **Manifest Analysis**: Permission and component inspection\n- **Resource Extraction**: Assets, strings, configuration files\n- **DEX Analysis**: Dalvik bytecode processing\n\n**Security Scanning:**\n- **Code Pattern Detection**: Custom vulnerability rules\n- **API Usage Analysis**: Android framework and library calls\n- **Component Security**: Activity, Service, BroadcastReceiver analysis\n- **Permission Analysis**: Dangerous permission usage patterns\n\n**AI Integration:**\n- **Context-Aware Analysis**: Understanding of Android architecture\n- **Vulnerability Categorization**: Automatic classification and severity scoring\n- **Fix Generation**: AI-generated patches for detected issues\n\n### React Native Analysis\n\n**Standard Analysis:**\n- **Bundle Extraction**: JavaScript bundle identification and extraction\n- **Bridge Analysis**: Native module interaction patterns\n- **Component Scanning**: React component security assessment\n- **Storage Analysis**: AsyncStorage and secure storage patterns\n\n**Enhanced Analysis (--enhanced-rn):**\n- **Bundle Decompilation**: Converts minified bundles back to readable modules\n- **Module-Level Analysis**: Individual React Native module examination\n- **Advanced Pattern Detection**: Bridge vulnerabilities, injection flaws\n- **react-native-decompiler Integration**: Automatic tool installation and usage\n\n**Supported Bundle Types:**\n- `index.android.bundle`\n- `main.jsbundle`\n- Custom bundle configurations\n- Hermes bytecode bundles\n\n### Flutter Analysis\n\n**Blutter Integration:**\n- **Dart Code Recovery**: Extract Dart source from Flutter APK\n- **Snapshot Analysis**: Dart VM snapshot processing\n- **Asset Extraction**: Flutter-specific resource analysis\n\n**Security Patterns:**\n- **Widget Security**: Flutter widget vulnerability patterns\n- **Platform Channel Analysis**: Native bridge security assessment\n- **Engine Integration**: Flutter engine security evaluation\n\n</details>\n\n<details>\n<summary>\ud83d\ude80 Dynamic Analysis (MobSF Integration)</summary>\n\n## MobSF Dynamic Analysis\n\n### Setup Requirements\n\n1. **Install MobSF Server:**\n```bash\n# Clone and setup MobSF\ngit clone https://github.com/MobSF/Mobile-Security-Framework-MobSF.git\ncd Mobile-Security-Framework-MobSF\n./setup.sh\n```\n\n2. **Start MobSF Server:**\n```bash\n# Start server (usually http://localhost:8000)\npython manage.py runserver\n```\n\n3. **Get API Key:**\n- Access MobSF web interface\n- Navigate to API Key section\n- Generate and copy API key\n\n### Dynamic Analysis Workflow\n\n```bash\n# Run with dynamic analysis\nlu77u-mobilesec app.apk --dynamic\n```\n\n**Analysis Process:**\n1. **APK Upload**: Automatic upload to MobSF server\n2. **Static Analysis**: MobSF performs initial static scan\n3. **Dynamic Setup**: Configures testing environment\n4. **Runtime Testing**: Monitors application behavior\n5. **Report Generation**: Combines static and dynamic results\n\n### Dynamic Analysis Features\n\n**Real-time Monitoring:**\n- **Network Traffic**: HTTP/HTTPS request monitoring\n- **File System Access**: Runtime file operation tracking\n- **Component Interaction**: Activity and service behavior\n- **API Endpoint Discovery**: Automatic endpoint detection\n\n**Security Testing:**\n- **SSL/TLS Validation**: Certificate and encryption analysis\n- **Authentication Testing**: Session management evaluation\n- **Input Validation**: Runtime injection testing\n- **Permission Usage**: Runtime permission analysis\n\n**Integration Benefits:**\n- **Combined Results**: Static + dynamic vulnerability correlation\n- **Behavioral Context**: Understanding of application runtime behavior\n- **Network Security**: Comprehensive communication analysis\n- **False Positive Reduction**: Dynamic validation of static findings\n\n</details>\n\n<details>\n<summary>\ud83e\udd16 AI-Powered Analysis</summary>\n\n## AI Integration & Capabilities\n\n### Groq API Integration\n\n**Features:**\n- **Cloud-based Processing**: High-performance LLM analysis\n- **Real-time Analysis**: Fast vulnerability detection and fix generation\n- **Latest Models**: Access to cutting-edge language models\n- **Scalable**: Handles large codebases efficiently\n\n**Setup:**\n```bash\n# Set API key\nexport GROQ_API_KEY=\"your-groq-api-key\"\n\n# Use Groq for analysis\nlu77u-mobilesec app.apk --llm groq --fix\n```\n\n### Ollama Integration (Local LLM)\n\n**Features:**\n- **Privacy-focused**: All analysis runs locally\n- **DeepSeek Coder Model**: Specialized for code analysis\n- **Offline Operation**: No internet required after setup\n- **Cost-effective**: No API usage fees\n\n**Setup:**\n```bash\n# Ollama installation (automatic via tool)\n# Model download (automatic on first use)\n\n# Use Ollama (default)\nlu77u-mobilesec app.apk --fix\n```\n\n### AI Analysis Capabilities\n\n**Vulnerability Detection:**\n- **Pattern Recognition**: Advanced code pattern analysis\n- **Context Understanding**: Business logic comprehension\n- **Semantic Analysis**: Meaning-based vulnerability detection\n- **False Positive Filtering**: Intelligent result filtering\n\n**Fix Generation:**\n- **Automated Patching**: AI-generated code fixes\n- **Context-aware Solutions**: Fixes that understand application architecture\n- **Multiple Fix Options**: Alternative solutions for complex issues\n- **Explanation Generation**: Detailed fix rationale and implementation\n\n**Severity Assessment:**\n- **CVSS Integration**: Standard vulnerability scoring\n- **Context-based Scoring**: Application-specific risk assessment\n- **Business Impact Analysis**: Understanding of security implications\n- **Prioritization Guidance**: Risk-based fix ordering\n\n</details>\n\n<details>\n<summary>\ud83d\udcca Output Structure & Reporting</summary>\n\n## Analysis Results Organization\n\n### Output Directory Structure\n\n```\nWorks/\n\u251c\u2500\u2500 {apk_name}_{timestamp}/\n\u2502   \u251c\u2500\u2500 Dynamic Analysis/              # MobSF dynamic analysis results\n\u2502   \u2502   \u251c\u2500\u2500 mobsf_report.json         # Complete MobSF analysis\n\u2502   \u2502   \u251c\u2500\u2500 network_traffic.json      # Network monitoring data\n\u2502   \u2502   \u2514\u2500\u2500 runtime_analysis.json     # Behavioral analysis\n\u2502   \u251c\u2500\u2500 Files Processed for Working/   # Extracted and processed files\n\u2502   \u2502   \u251c\u2500\u2500 decompiled/               # JADX/Blutter output\n\u2502   \u2502   \u251c\u2500\u2500 resources/                # Extracted resources\n\u2502   \u2502   \u2514\u2500\u2500 manifest/                 # Manifest analysis\n\u2502   \u251c\u2500\u2500 Fixes Requested/              # AI-generated vulnerability fixes\n\u2502   \u2502   \u251c\u2500\u2500 vulnerability_fixes.json  # Structured fix data\n\u2502   \u2502   \u2514\u2500\u2500 fix_code/                 # Generated code patches\n\u2502   \u251c\u2500\u2500 Prompts Given to AI/          # AI analysis prompts\n\u2502   \u2502   \u2514\u2500\u2500 analysis_prompts.txt      # Sent prompts for transparency\n\u2502   \u2514\u2500\u2500 Response By AI/               # AI analysis responses\n\u2502       \u251c\u2500\u2500 vulnerability_analysis.json\n\u2502       \u2514\u2500\u2500 detailed_responses.txt\n```\n\n### Report Types\n\n**Vulnerability Summary:**\n- High-level security assessment\n- Risk categorization and scoring\n- Executive summary of findings\n- Remediation priority matrix\n\n**Detailed Analysis:**\n- File-by-file vulnerability breakdown\n- Code snippets with vulnerability context\n- Technical explanation of security issues\n- Line-by-line analysis results\n\n**Fix Recommendations:**\n- AI-generated patch suggestions\n- Implementation guidance\n- Alternative solution approaches\n- Testing recommendations\n\n**Dynamic Results (if enabled):**\n- Runtime behavior analysis\n- Network traffic security assessment\n- Component interaction patterns\n- Real-time vulnerability validation\n\n### File Formats\n\n**JSON Format:**\n- Structured data for integration\n- Machine-readable vulnerability data\n- API-friendly format for automation\n- Standard vulnerability schema\n\n**Human-readable Reports:**\n- Clear vulnerability descriptions\n- Step-by-step fix instructions\n- Code examples and explanations\n- Executive summaries\n\n**Generated Code:**\n- Ready-to-use patch files\n- Commented fix implementations\n- Alternative solution approaches\n- Integration instructions\n\n</details>\n\n<details>\n<summary>\ud83d\udd27 Advanced Configuration</summary>\n\n## Framework-Specific Configuration\n\n### React Native Enhanced Analysis\n\n**Prerequisites:**\n- Node.js (v14+) and npm\n- Internet connection for tool installation\n\n**Enhanced Features:**\n```bash\n# Enable enhanced analysis\nlu77u-mobilesec app.apk --type react-native --enhanced-rn\n```\n\n**Capabilities:**\n- **Bundle Decompilation**: Converts minified JavaScript to readable code\n- **Module Resolution**: Individual React Native module analysis\n- **Advanced Patterns**: Bridge vulnerability detection\n- **Context Preservation**: Maintains function and component context\n\n**Tool Integration:**\n- **react-native-decompiler**: Automatic installation and usage\n- **Bundle Processing**: Support for multiple bundle formats\n- **Source Map Support**: When available, uses source maps for accuracy\n\n### Flutter Analysis Configuration\n\n**Blutter Integration:**\n- **Automatic Setup**: Tool handles Blutter installation\n- **Dart Recovery**: Extracts Dart source from compiled Flutter apps\n- **Asset Processing**: Flutter-specific resource extraction\n\n### Java/Kotlin Analysis Options\n\n**JADX Configuration:**\n- **Decompilation Options**: Optimized settings for security analysis\n- **Resource Extraction**: Complete APK content extraction\n- **Multi-threading**: Parallel processing for large APKs\n\n### MobSF Configuration\n\n**Server Setup:**\n```bash\n# Custom MobSF server URL\nexport MOBSF_URL=\"http://your-mobsf-server:8000\"\n\n# API key configuration\nexport MOBSF_API_KEY=\"your-api-key\"\n```\n\n**Analysis Options:**\n- **Static + Dynamic**: Combined analysis mode\n- **Dynamic Only**: Runtime-focused testing\n- **Custom Timeout**: Configurable analysis duration\n\n</details>\n\n<details>\n<summary>\ud83d\udc1b Troubleshooting</summary>\n\n## Common Issues & Solutions\n\n### Installation Issues\n\n**Problem: JADX not found**\n```bash\n# macOS\nbrew install jadx\n\n# Linux - Download from releases\nwget https://github.com/skylot/jadx/releases/latest/download/jadx-1.4.7.zip\nunzip jadx-1.4.7.zip -d /opt/jadx\nsudo ln -s /opt/jadx/bin/jadx /usr/local/bin/jadx\n\n# Windows - Download and add to PATH\n```\n\n**Problem: Node.js required for React Native**\n```bash\n# macOS\nbrew install node\n\n# Linux\nsudo apt install nodejs npm\n\n# Windows\nchoco install nodejs\n```\n\n**Problem: Java not found**\n```bash\n# Install OpenJDK 11+\nbrew install openjdk@11    # macOS\nsudo apt install openjdk-11-jdk    # Linux\nchoco install openjdk    # Windows\n```\n\n### Analysis Issues\n\n**Problem: APK parsing errors**\n- Verify APK file integrity\n- Check file permissions (readable)\n- Use `--debug` flag for detailed error information\n- Ensure APK is a valid Android application\n\n**Problem: Decompilation failures**\n- Large APKs may require more memory\n- Corrupted APKs cannot be processed\n- Some obfuscated APKs may have limited decompilation success\n- Try different analysis types if auto-detection fails\n\n**Problem: Framework detection issues**\n- Use `--type` flag to force specific framework\n- Check if APK contains expected framework files\n- Some hybrid apps may need manual type specification\n\n### MobSF Integration Issues\n\n**Problem: MobSF connection fails**\n- Verify MobSF server is running (`http://localhost:8000`)\n- Check API key is correct\n- Ensure network connectivity to MobSF server\n- Verify MobSF version compatibility\n\n**Problem: Dynamic analysis timeout**\n- Increase timeout in MobSF settings\n- Check device/emulator connectivity\n- Ensure sufficient system resources\n\n### AI Issues\n\n**Problem: Groq API errors**\n- Verify `GROQ_API_KEY` environment variable\n- Check internet connectivity\n- Ensure API quota is available\n- Validate API key permissions\n\n**Problem: Ollama not responding**\n- Check if Ollama service is running: `ollama list`\n- Verify DeepSeek Coder model: `ollama pull deepseek-coder:6.7b`\n- Restart Ollama service: `ollama serve`\n- Check system resources (RAM requirements)\n\n**Problem: AI analysis slow**\n- For Groq: Check internet speed and API limits\n- For Ollama: Ensure sufficient RAM (8GB+ recommended)\n- Use `--debug` to monitor analysis progress\n\n### Performance Issues\n\n**Problem: Long analysis times**\n- Large APKs require more processing time\n- Dynamic analysis adds significant time\n- Enhanced React Native analysis is slower but more accurate\n- Use selective analysis types for faster results\n\n**Problem: Memory issues**\n- Increase Java heap size for JADX\n- Close other applications during analysis\n- Use 64-bit Java installation\n- Consider analyzing smaller APK subsets\n\n### File Permission Issues\n\n**Problem: Cannot write output files**\n- Check write permissions in current directory\n- Ensure sufficient disk space\n- Verify user permissions for output location\n\n</details>\n\n<details>\n<summary>\ud83e\udd1d Contributing</summary>\n\n## Development & Contributions\n\n### Development Setup\n\n```bash\n# Clone repository\ngit clone https://github.com/sam-mg/lu77U-MobileSec.git\ncd lu77U-MobileSec\n\n# Create virtual environment\npython -m venv venv\nsource venv/bin/activate  # Linux/macOS\n# or\nvenv\\Scripts\\activate  # Windows\n\n# Install in development mode\npip install -e .\n\n# Install development dependencies\npip install -e \".[dev]\"\n\n# Run tests\npytest\n\n# Run linting\nflake8 lu77u_mobilesec/\nblack lu77u_mobilesec/\nmypy lu77u_mobilesec/\n```\n\n### Code Style & Standards\n\n- **Black**: Code formatting (line length: 88)\n- **Flake8**: Linting and style checking\n- **MyPy**: Static type checking\n- **Pytest**: Unit and integration testing\n\n### Project Structure\n\n```\nlu77u_mobilesec/\n\u251c\u2500\u2500 ai/                    # AI provider integrations\n\u2502   \u251c\u2500\u2500 processors/        # AI analysis processors\n\u2502   \u2514\u2500\u2500 providers/         # Groq, Ollama implementations\n\u251c\u2500\u2500 cli/                   # Command-line interface\n\u251c\u2500\u2500 constants/             # Framework definitions, patterns\n\u251c\u2500\u2500 core/                  # Core analysis engine\n\u2502   \u251c\u2500\u2500 analyzers/         # Framework-specific analyzers\n\u2502   \u2514\u2500\u2500 detectors/         # Framework detection logic\n\u251c\u2500\u2500 system/                # System validation and setup\n\u251c\u2500\u2500 tools/                 # External tool integrations\n\u2502   \u251c\u2500\u2500 android_tools/     # Android SDK utilities\n\u2502   \u251c\u2500\u2500 decompilers/       # JADX, Blutter, RN decompiler\n\u2502   \u2514\u2500\u2500 mobsf_scripts/     # MobSF API integration\n\u2514\u2500\u2500 utils/                 # Utility functions\n    \u251c\u2500\u2500 config/            # Configuration management\n    \u251c\u2500\u2500 file_system/       # File operations\n    \u2514\u2500\u2500 helpers/           # Helper functions\n```\n\n### Contributing Guidelines\n\n1. **Fork the Repository**\n   - Create personal fork on GitHub\n   - Clone fork locally for development\n\n2. **Create Feature Branch**\n   ```bash\n   git checkout -b feature/amazing-feature\n   ```\n\n3. **Make Changes**\n   - Follow existing code style\n   - Add tests for new functionality\n   - Update documentation as needed\n\n4. **Test Changes**\n   ```bash\n   # Run tests\n   pytest\n\n   # Run linting\n   flake8 lu77u_mobilesec/\n   black lu77u_mobilesec/ --check\n\n   # Type checking\n   mypy lu77u_mobilesec/\n   ```\n\n5. **Commit Changes**\n   ```bash\n   git add .\n   git commit -m \"Add amazing feature\"\n   ```\n\n6. **Push to Branch**\n   ```bash\n   git push origin feature/amazing-feature\n   ```\n\n7. **Open Pull Request**\n   - Provide clear description of changes\n   - Reference any related issues\n   - Ensure CI checks pass\n\n### Areas for Contribution\n\n**New Framework Support:**\n- Xamarin applications\n- Ionic/Cordova apps\n- Unity mobile games\n- Progressive Web Apps (PWA)\n\n**Vulnerability Patterns:**\n- Additional security detection rules\n- Framework-specific vulnerability patterns\n- OWASP Mobile Top 10 implementations\n- Custom vulnerability definitions\n\n**AI Integrations:**\n- Additional LLM providers (OpenAI, Anthropic)\n- Custom model fine-tuning\n- Specialized security models\n- Local model optimizations\n\n**Tool Integrations:**\n- Additional decompilers\n- Static analysis tools\n- Dynamic analysis platforms\n- CI/CD pipeline integrations\n\n**Documentation:**\n- Tutorial content\n- Video guides\n- Translations\n- Best practices guides\n\n**Testing:**\n- Expanded test coverage\n- Performance benchmarks\n- Integration test scenarios\n- Sample APK creation\n\n### Development Tips\n\n- Use `--debug` flag extensively during development\n- Test with various APK types and sizes\n- Ensure cross-platform compatibility\n- Add logging for debugging complex issues\n- Follow existing error handling patterns\n\n</details>\n\n## \ud83d\udcc4 License\n\nThis project is licensed under the Apache License 2.0 - see the [LICENSE](LICENSE) file for details.\n\n## \ud83d\udc68\u200d\ud83d\udcbb Author\n\n**Sam MG Harish (lu77_u)**\n- Email: sammgharish@gmail.com\n- GitHub: [@sam-mg](https://github.com/sam-mg)\n\n---\n\n## \u2b50 Support\n\nIf you find this tool helpful, please consider:\n- \u2b50 Starring the repository\n- \ud83d\udc1b Reporting bugs and issues\n- \ud83d\udca1 Suggesting new features\n- \ud83e\udd1d Contributing to the project\n\n<p align=\"right\">\n    <img src=\"https://wakatime.com/badge/user/f5bf5341-405c-480f-bd76-40a5c1a8ada9/project/f2697ac6-8530-46a0-ae2c-01eb4f730bdb.svg?style=for-the-badge\"/>\n</p>\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Professional mobile security analysis and vulnerability patching tool for Android applications with AI-powered detection and automated fix generation",
    "version": "1.0.1",
    "project_urls": {
        "Documentation": "https://github.com/sam-mg/lu77U-MobileSec/wiki",
        "Homepage": "https://github.com/sam-mg/lu77U-MobileSec",
        "Issues": "https://github.com/sam-mg/lu77U-MobileSec/issues",
        "Repository": "https://github.com/sam-mg/lu77U-MobileSec"
    },
    "split_keywords": [
        "mobile-security",
        " apk-analysis",
        " android-security",
        " vulnerability-detection",
        " security-patches",
        " pentesting",
        " mobile-app-security",
        " automated-fixes",
        " lu77u"
    ],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "95ddff55b31ee21f8cddd4fcc6ce26383e3e673ae0c6653a67846e8ca6f2f3a0",
                "md5": "6e8f4fec8c2d9bbd104e93fe02975e97",
                "sha256": "01fe65f5a96ef2bc9d78b269d76b6348efc3188166bb60053b07f0ddabd6cfc9"
            },
            "downloads": -1,
            "filename": "lu77u_mobilesec-1.0.1-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "6e8f4fec8c2d9bbd104e93fe02975e97",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.13",
            "size": 186737,
            "upload_time": "2025-07-09T06:53:14",
            "upload_time_iso_8601": "2025-07-09T06:53:14.383515Z",
            "url": "https://files.pythonhosted.org/packages/95/dd/ff55b31ee21f8cddd4fcc6ce26383e3e673ae0c6653a67846e8ca6f2f3a0/lu77u_mobilesec-1.0.1-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "53bcebd92f8447194901fbe5c7c641ee77aa8b7c50b6c2d87200fadce10e792f",
                "md5": "3d72f97f882d2b6903751c591577e151",
                "sha256": "399b58e8324e06f59106998ca29b35e0801cc7e9218ca9ee5b9fa671a71ba651"
            },
            "downloads": -1,
            "filename": "lu77u_mobilesec-1.0.1.tar.gz",
            "has_sig": false,
            "md5_digest": "3d72f97f882d2b6903751c591577e151",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.13",
            "size": 179382,
            "upload_time": "2025-07-09T06:53:15",
            "upload_time_iso_8601": "2025-07-09T06:53:15.649799Z",
            "url": "https://files.pythonhosted.org/packages/53/bc/ebd92f8447194901fbe5c7c641ee77aa8b7c50b6c2d87200fadce10e792f/lu77u_mobilesec-1.0.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-07-09 06:53:15",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "sam-mg",
    "github_project": "lu77U-MobileSec",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "requirements": [
        {
            "name": "groq",
            "specs": [
                [
                    ">=",
                    "0.4.0"
                ]
            ]
        },
        {
            "name": "requests",
            "specs": [
                [
                    ">=",
                    "2.25.0"
                ]
            ]
        },
        {
            "name": "requests-toolbelt",
            "specs": [
                [
                    ">=",
                    "0.9.1"
                ]
            ]
        },
        {
            "name": "aiohttp",
            "specs": [
                [
                    ">=",
                    "3.8.0"
                ]
            ]
        },
        {
            "name": "httpx",
            "specs": [
                [
                    ">=",
                    "0.24.0"
                ]
            ]
        },
        {
            "name": "zipfile36",
            "specs": [
                [
                    ">=",
                    "0.1.3"
                ]
            ]
        },
        {
            "name": "xmltodict",
            "specs": [
                [
                    ">=",
                    "0.13.0"
                ]
            ]
        },
        {
            "name": "lxml",
            "specs": [
                [
                    ">=",
                    "4.9.0"
                ]
            ]
        },
        {
            "name": "jsonschema",
            "specs": [
                [
                    ">=",
                    "4.0.0"
                ]
            ]
        },
        {
            "name": "pyyaml",
            "specs": [
                [
                    ">=",
                    "6.0"
                ]
            ]
        },
        {
            "name": "python-magic",
            "specs": [
                [
                    ">=",
                    "0.4.27"
                ]
            ]
        },
        {
            "name": "psutil",
            "specs": [
                [
                    ">=",
                    "5.8.0"
                ]
            ]
        },
        {
            "name": "click",
            "specs": [
                [
                    ">=",
                    "8.0.0"
                ]
            ]
        },
        {
            "name": "rich",
            "specs": [
                [
                    ">=",
                    "13.0.0"
                ]
            ]
        },
        {
            "name": "colorama",
            "specs": [
                [
                    ">=",
                    "0.4.6"
                ]
            ]
        },
        {
            "name": "cryptography",
            "specs": [
                [
                    ">=",
                    "3.4.8"
                ]
            ]
        }
    ],
    "lcname": "lu77u-mobilesec"
}
        
Elapsed time: 0.71701s