Android Forensics Tools
My personal compilation of tools for Android Forensics and Analysis. I will be extending this list.
ADB
Useful to interact with Android devices via the command line.
Commands:
adb devices # List connected devices
adb shell # Start shell on device
adb install .\app-debug.apk # Install app
adb pull /sdcard/data.txt # Copy file from device
adb push # Ex (adb push .\frida-server-16.7.14-android-x86_64 /data/local/tmp/)
adb logcat # View device logs
LiME (Linux Memory Extractor)
Dumping volatile memory from Android devices.
Usage Example:
insmod lime.ko "path=/sdcard/mem.lime format=lime"
FTK Imager
To open and view a forensic image
ALEAPP
Parses multiple artifact types (SMS, contacts, call logs, locations, apps, etc.) 🔗 ALEAPP GitHub
- Extract data from the Android device (e.g., using ADB or physical acquisition tools).
- Run ALEAPP on the extracted data folder:
python aleapp.py -i /path/to/extracted/data -o /path/to/output/report