Skip to content

LockKnife : The Ultimate Android Security Research Tool - Your Gateway to Android Security Research! πŸ—οΈ Dive deep into Android security with this powerful command-line tool designed for researchers/hackers. Recover/Crack lock screen Passwords/Pins/Patterns, extract sensitive data like SMS, Call Logs, Credentials, forensic analysis and more. πŸ”’πŸ’«

License

Notifications You must be signed in to change notification settings

ImKKingshuk/LockKnife

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

55 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

LockKnife Icon

LockKnife

The Ultimate Android Security Research Tool

One Tool. Any Device. Full Control. Enterprise Grade. Unlimited Power

Forensics, Analysis, Recovery, Intelligence - Everything

LockKnife : The Ultimate Android Security Research Tool - Your Complete Android Security Research Arsenal! πŸ—οΈπŸ”¬πŸ”’ Dive deep into Android security with this next-generation enterprise-grade command-line tool featuring AI-powered analysis, cryptocurrency wallet forensics, threat intelligence integration, Android 16 support, and 20+ specialized modules. Recover lock screen credentials, perform AI-driven behavior analysis, analyze crypto wallets, detect threats with real-time intelligence, extract Private Space data (Android 15+), analyze passkeys (Android 14+), orchestrate multi-device investigations, generate professional forensic reports, and conduct cutting-edge security research. Connect your device and unleash the full power of advanced Android security research! πŸ”’πŸ’«πŸš€


Platform Version License

Website


Features Status Legend

Tag Meaning
βœ… Fully Working - Feature is complete and operational
πŸ”§ Functional - Core functionality works, with some limitations
πŸ”¬ Partial - Basic implementation, results may be incomplete
🚧 Coming Soon - Placeholder/under development

Core Features βœ…

πŸ”’ Password Recovery βœ…

  • Gesture Pattern Recovery βœ…: Recover lock screen gesture patterns with hash mapping and visualization
  • Dictionary Attack βœ…: Use custom wordlists to recover alphanumeric passwords with parallel processing support
  • Brute Force Attack βœ…: PIN cracking for 4, 6, or 8-digit PINs with progress tracking
  • Wi-Fi Password Extraction βœ…: Recover saved WiFi passwords from WifiConfigStore.xml
  • Locksettings Database Analysis βœ…: Extract and analyze locksettings.db for newer Android versions
  • Gatekeeper HAL Analysis βœ…: Modern credential storage analysis and response monitoring

πŸ“± Android Version Support βœ…

  • Android 5 and Older βœ…
  • Android 6 to 9 βœ…
  • Android 10 to 13 βœ…
  • Android 14 (Credential Manager detection) πŸ”§
  • Android 15 (Private Space detection) πŸ”§
  • Android 16+ (Full compatibility mode) πŸ”§

πŸ“Š Data Extraction βœ…

  • SMS Messages Extraction βœ…: Pull and analyze mmssms.db with statistics
  • Call Logs Extraction βœ…: Full call history with type classification
  • Wi-Fi Passwords βœ…: Complete WiFi credential extraction
  • WhatsApp Data βœ…: Extract msgstore.db, contacts, and media files
  • Telegram Data βœ…: Database and configuration extraction
  • Signal Data πŸ”§: Extraction support (limited by SQLCipher encryption)
  • Browser Data βœ…: Chrome, Firefox, Brave, Edge history, cookies, and credentials
  • Bluetooth Pairing Keys βœ…: Extract Bluetooth configuration and paired devices

Analysis Tools

πŸ” Forensic Analysis βœ…

  • Device Snapshot Creation βœ…: Capture file system for offline analysis
  • Live Analysis βœ…: Real-time device state analysis
  • Custom Data Extraction βœ…: Pull specific files or directories
  • SQLite Database Analysis βœ…: Extract and analyze any database
  • Search Functionality βœ…: Find sensitive information in snapshots
  • App-Specific Extraction βœ…: Specialized tools for popular messaging apps

πŸš€ Runtime Analysis πŸ”§

  • Process Monitoring πŸ”§: Real-time process listing and analysis
  • Memory Mapping πŸ”§: Process memory inspection
  • Frida Integration πŸ”¬: Runtime instrumentation (requires Frida server on device)
  • Anti-Debugging Detection πŸ”¬: Identify debugging attempts

πŸ”“ SSL Pinning Bypass πŸ”§

  • Certificate Pinning Detection πŸ”§: Identify SSL pinning implementations
  • Frida SSL Bypass πŸ”¬: Runtime SSL bypass scripts (requires Frida)
  • Network Interception Setup πŸ”§: MITM proxy configuration
  • Burp Suite Integration πŸ”§: Proxy setup guidance

πŸ“± Advanced APK Analysis πŸ”§

  • Static Analysis βœ…: Manifest parsing, permission analysis, resource inspection
  • Code Analysis πŸ”§: DEX/SMALI inspection (requires external tools)
  • Vulnerability Scanning πŸ”§: Automated security checks
  • Malware Indicators πŸ”§: Suspicious pattern detection
  • Signature Verification βœ…: APK signature validation

🌐 Network Traffic Analysis βœ…

  • Traffic Capture βœ…: Record network traffic with tcpdump (requires root)
  • Protocol Analysis βœ…: Analyze with tshark integration
  • HTTP/DNS Analysis βœ…: Request and query extraction
  • Unencrypted Traffic Detection βœ…: Identify insecure communications

πŸ” Advanced Memory Analysis πŸ”§

  • Memory Dumping πŸ”¬: Process memory extraction (requires root)
  • Memory Leak Detection πŸ”¬: Basic allocation analysis
  • Heap/Stack Analysis πŸ”¬: Memory inspection capabilities

🧠 Kernel & SELinux Analysis πŸ”§

  • Kernel Module Analysis πŸ”§: Inspect loaded modules
  • SELinux Policy Analysis πŸ”§: Review security policies
  • Security Feature Assessment πŸ”§: Evaluate hardening status
  • AVC Denial Monitoring πŸ”§: Track access denials

Security Assessment

🦠 Malware Analysis βœ…

  • Application Scanning βœ…: Check installed apps for suspicious indicators
  • Permission Analysis βœ…: Identify dangerous permission combinations
  • Package Analysis βœ…: Verify app signatures and sources
  • System File Scanning πŸ”§: Check for compromised system files
  • Network Malware Detection πŸ”§: Analyze connections for malicious activity
  • YARA Integration πŸ”¬: Pattern matching (requires YARA installation)

πŸ” Vulnerability Scanning πŸ”§

  • System Vulnerabilities πŸ”§: Check for known Android security issues
  • App Vulnerabilities πŸ”§: Analyze installed apps for flaws
  • Configuration Issues πŸ”§: Identify insecure settings

πŸ”§ Hardware Security Analysis πŸ”§

  • TEE Analysis πŸ”§: Trusted Execution Environment assessment
  • Hardware-Backed Keystore πŸ”§: Secure key storage analysis
  • Secure Element Analysis πŸ”¬: eSE/UICC evaluation
  • Biometric Hardware πŸ”§: Fingerprint/face recognition assessment

πŸ”© Bootloader & Firmware πŸ”§

  • Bootloader Assessment βœ…: Lock status and OEM unlock detection
  • Firmware Extraction πŸ”§: Partition dumping capabilities
  • Boot Image Analysis πŸ”¬: Inspect boot images
  • Verified Boot Status βœ…: Check integrity verification

☁️ Cloud Backup Extraction πŸ”¬

  • Google Drive πŸ”¬: Synced data detection (limited extraction)
  • Samsung Cloud πŸ”¬: Samsung account detection
  • Cloud Configuration πŸ”§: Backup settings analysis

Next-Gen(Experimental) Features πŸ”¬

πŸ”¬ Note: These features are newly added and provide foundational analysis capabilities. As they are under active development, results may be incomplete. Some features generate reports based on available data analysis.

πŸ€– AI-Powered Analysis πŸ”¬

  • Password Pattern Prediction πŸ”§: Statistical analysis-based password guessing
  • Behavioral Anomaly Detection πŸ”§: Process and network anomaly identification
  • Malware Classification πŸ”§: Pattern-based risk scoring
  • User Activity Analysis πŸ”¬: App usage pattern detection
  • Security Assessment πŸ”¬: Risk forecasting and posture evaluation
  • Data Correlation πŸ”¬: Cross-reference extracted data

β‚Ώ Cryptocurrency Forensics πŸ”¬

  • Wallet Detection βœ…: Identify crypto wallet apps (Coinbase, Binance, MetaMask, etc.)
  • Wallet Data Extraction πŸ”§: Extract wallet app data (requires root)
  • Transaction History πŸ”¬: Transaction data analysis
  • Seed Phrase Recovery πŸ”¬: Attempt recovery (heavily encrypted)
  • Private Key Extraction πŸ”¬: Key extraction attempts
  • Exchange App Analysis πŸ”§: Forensics for exchange applications
  • NFT & DeFi Analysis πŸ”¬: Token and protocol detection

🌐 Threat Intelligence πŸ”¬

  • IOC Detection πŸ”§: Indicators of Compromise identification
  • App Reputation Analysis πŸ”§: Check apps against threat databases
  • URL/Domain Analysis πŸ”¬: Domain reputation (requires API keys)
  • File Hash Lookup πŸ”¬: VirusTotal integration (requires API key)
  • IP Reputation πŸ”¬: IP address checking
  • CVE Vulnerability Check πŸ”¬: Known vulnerability detection
  • Real-Time Threat Feeds πŸ”¬: Integration with VirusTotal, AlienVault OTX (requires API keys)

πŸ”’ Private Space Analysis (Android 15+) πŸ”§

  • Private Space Detection βœ…: Identify Private Space usage
  • User Profile Analysis βœ…: Detect multiple isolated profiles
  • Private App Listing πŸ”§: List apps in Private Space
  • Data Extraction πŸ”§: Extract from isolated profiles (requires root)
  • Security Analysis πŸ”§: Assess Private Space implementation
  • Isolation Boundary Testing πŸ”¬: Test app isolation

πŸ”‘ Passkey & Credential Analysis (Android 14+) πŸ”§

  • Credential Manager Detection βœ…: Identify modern credential storage
  • Passkey Data Extraction πŸ”§: Extract passkey metadata (requires root)
  • WebAuthn Analysis πŸ”§: Analyze web authentication credentials
  • FIDO2 Support πŸ”¬: Security key detection
  • Biometric Binding πŸ”¬: Analyze passkey-biometric associations

πŸ“± Multi-Device Orchestration πŸ”§

  • Device Scanning βœ…: Detect all connected devices
  • Parallel Information Gathering βœ…: Simultaneous data collection
  • Synchronized Extraction πŸ”§: Parallel data extraction
  • Cross-Device Correlation πŸ”¬: Find relationships between devices
  • Comparative Analysis πŸ”¬: Compare security postures
  • Multi-Device Timeline πŸ”¬: Unified event reconstruction

πŸ“Š Advanced Report Generation βœ…

  • Executive Summary βœ…: High-level reports for stakeholders
  • Technical Reports βœ…: Detailed technical analysis
  • Timeline Reports πŸ”§: Event timeline reconstruction
  • Security Assessment Reports βœ…: Comprehensive security reports
  • Evidence Collection Reports βœ…: Chain of custody documentation
  • Compliance Reports πŸ”¬: GDPR, HIPAA (template-based)
  • Multiple Formats πŸ”¬: PDF/HTML export (requires pandoc)

Features 🚧 (Coming Soon)

πŸ“‘ Real-Time Monitoring 🚧

  • Live device activity monitoring
  • Process activity dashboards
  • Network traffic visualization
  • System resource tracking
  • Alert notifications

🌐 IoT Device Analysis 🚧

  • Detect connected IoT devices
  • Bluetooth LE device scanning
  • Smart home protocol analysis
  • IoT communication monitoring
  • Security assessment

πŸ”Œ Plugin System 🚧

  • Install community plugins
  • Browse plugin marketplace
  • Custom plugin development
  • Plugin security scanning
  • Auto-update capability

Requirements

Optional Dependencies for Enhanced Features

Memory Analysis:

  • gdb/lldb for debugging capabilities
  • valgrind for memory leak detection

Kernel Analysis:

  • Kernel headers for inspection
  • SELinux policy tools

Malware Analysis:

  • ClamAV or similar antivirus
  • YARA for pattern matching

Network Analysis:

  • tcpdump for traffic capture
  • nmap for network scanning

Threat Intelligence:

  • VirusTotal API key
  • AlienVault OTX API key

Reports:

  • pandoc for PDF/HTML export

How to Use

To use LockKnife : The Ultimate Android Security Research Tool, follow these steps:

  1. Connect your Android device to your computer with USB debugging enabled.

  2. Run the following command in your terminal:

    bash -c "$(curl -fsSL https://raw.githubusercontent.com/ImKKingshuk/LockKnife/main/LockKnife.sh)"

    For advanced debugging and verbose output, use:

    bash -c "$(curl -fsSL https://raw.githubusercontent.com/ImKKingshuk/LockKnife/main/LockKnife.sh)" -- --debug

    To create a default configuration file:

    bash -c "$(curl -fsSL https://raw.githubusercontent.com/ImKKingshuk/LockKnife/main/LockKnife.sh)" -- --create-config=~/.config/lockknife/lockknife.conf

    Follow the on-screen prompts to select your device and choose the desired features.

Configuration

LockKnife looks for configuration files in the following locations (in order):

  1. ./lockknife.conf (current directory)
  2. $HOME/.config/lockknife/lockknife.conf (user config directory)
  3. /etc/lockknife.conf (system-wide config)

You can also specify a custom config file using the --config=FILE command-line option.

See lockknife.conf for all 100+ configurable options including:

  • Attack settings (wordlist, parallel jobs, PIN length)
  • Forensics settings (snapshot directories, PCAP filters)
  • App-specific extraction options
  • Advanced analysis depth settings
  • Threat intelligence API keys
  • Report generation preferences

Disclaimer

LockKnife : The Ultimate Android Security Research Tool is developed for research and educational purposes. It should be used responsibly and in compliance with all applicable laws and regulations. The developer of this tool is not responsible for any misuse or illegal activities conducted with this tool.

Password recovery tools should only be used for legitimate purposes and with proper authorization. Using such tools without proper authorization is illegal and a violation of privacy. Ensure proper authorization before using LockKnife for password recovery or data extraction. Always adhere to ethical hacking practices and comply with all applicable laws and regulations.

License

This project is licensed under the GPL-3.0-or-later License.

Happy Android Security Research with LockKnife! πŸ”’πŸ’«

About

LockKnife : The Ultimate Android Security Research Tool - Your Gateway to Android Security Research! πŸ—οΈ Dive deep into Android security with this powerful command-line tool designed for researchers/hackers. Recover/Crack lock screen Passwords/Pins/Patterns, extract sensitive data like SMS, Call Logs, Credentials, forensic analysis and more. πŸ”’πŸ’«

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

 

Packages

No packages published

Languages