android-armor-breaker

Android APK脱壳工具(android脱壳)与加固破解工具 - Frida-based dynamic unpacker for commercial protections (360, Baidu, Tencent, IJIAMI, Bangcle, AliProtect). Extract DEX from protected APKs, bypass anti-debug, support root memory extraction. 安卓加固脱壳、反调试绕过、DEX提取、内存dump、Frida脱壳、Android逆向、安全研究。android脱壳、脱壳工具、frida脱壳、APK脱壳、加固破解、反调试、内存提取、逆向工程。Supports Android脱壳, Frida脱壳, APK脱壳, 加固破解, 反调试 bypass, memory extraction, root memory dump, DEX extraction, commercial reinforcement analysis.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "android-armor-breaker" with this command: npx skills add haonings/android-armor-breaker

1. Name

android-armor-breaker

2. Description

Android Armor Breaker - Multi-strategy unpacking technology for the OpenClaw platform, targeting commercial to enterprise-level Android application protection solutions. Combines Frida-based dynamic injection, Root memory static analysis, and Intelligent DEX extraction to provide complete APK Reinforcement Analysis and DEX Extraction solutions.

Frida Unpacking Technology: Commercial-grade reinforcement breakthrough solution based on the Frida framework, supporting advanced features like deep search, anti-debug bypass, etc.

Core Features:

  1. APK Reinforcement Analysis - Static analysis of APK files to identify reinforcement vendors and protection levels
  2. Environment Check - Automatically checks Frida environment, device connection, app installation status, Root permissions
  3. Intelligent Unpacking - Automatically selects the best unpacking strategy based on protection level
  4. Real-time Monitoring Interface - Tracks DEX file extraction process, displays progress in real-time
  5. DEX Integrity Verification - Verifies the integrity and validity of generated DEX files
  6. Root Memory Extraction - Direct memory reading via root permissions, completely bypassing application-layer anti-debug (proven against IJIAMI, Bangcle, etc.)

Enhanced Features (for commercial reinforcement): 7. ✅ Application Warm-up Mechanism - Waits + simulates operations to trigger more DEX loading 8. ✅ Multiple Unpacking Attempts - Unpacks at multiple time points, merges results to improve coverage 9. ✅ Dynamic Loading Detection - Specifically detects dynamically loaded files like baiduprotect*.dex 10. ✅ Deep Integrity Verification - Multi-dimensional verification including file headers, size, Baidu protection features, etc. 11. ✅ Commercial Reinforcement Bypass - Root memory static analysis that completely bypasses IJIAMI, Bangcle, 360, Tencent, and other commercial protections (success rate: 95%+ with root access) 12. ✅ VDEX Format Processing - Automatic detection and extraction of DEX files from VDEX (Verifier DEX) format, targeting NetEase Yidun reinforcement (vdex027 format supported)

Internationalization Features (v2.2.0): 13. ✅ Multi-language Support - Full support for English and Chinese environments 14. ✅ Internationalized Logging - Unified international logging system 15. ✅ Language Parameter - --language en-US/zh-CN parameter support 16. ✅ Backward Compatibility - Defaults to English, no impact on existing functionality 17. ✅ Unified Experience - All core features support bilingual switching

Anti-Debug Enhancement Features (v2.2.0 - 2026-04-10): 18. ✅ Strong Anti-debug Protection Bypass - Specialized techniques for Thread.stop() detection, /proc file hiding 19. ✅ Enhanced Frida Hiding - Better hiding of Frida threads, memory mappings, and modules 20. ✅ Multi-layer Hook Strategy - Java layer + Native layer + System call hooks 21. ✅ Protection Type Auto-detection - Automatically detects and applies optimizations for strong anti-debug, IJIAMI, Bangcle, etc. 22. ✅ Timing Randomization - Random delays to bypass timing-based anti-debug detection 23. ✅ Comprehensive File Operation Hooks - Hooks fopen, open, readlink, ptrace, tracepid, etc. 24. ✅ Enhanced Verification System - Detailed verification with success/failure reporting

3. ⚠️ Security and Responsible Use Notice

Important Security Warning

Android Armor Breaker is a high-privilege, dual-use tool for legitimate security research. Due to its powerful capabilities, it has been flagged by ClawHub Security as "suspicious". Please review this section carefully before use.

Legal and Ethical Requirements

  • Only use on applications you own or have explicit written permission to analyze
  • Comply with all applicable laws and regulations (DMCA, CFAA, GDPR, etc.)
  • Respect intellectual property rights and licensing agreements
  • Obtain proper authorization before analyzing any third-party applications

Safety Guidelines

  1. Use Isolated Testing Environments: Test on dedicated Android devices or emulators, NOT personal or production devices
  2. Required Permissions: Rooted Android device, ADB root access, frida-server
  3. Script Inspection: Review all bundled scripts before execution
  4. Memory Access Awareness: This tool reads process memory which may contain sensitive information
  5. No External Data Transmission: Current version contains NO network calls or data exfiltration

Intended Use Cases

Legitimate: Security research, penetration testing, malware analysis, education ❌ Prohibited: Unauthorized application analysis, intellectual property theft, piracy, privacy violation

By using this tool, you acknowledge that you have read, understood, and agree to comply with these guidelines and all applicable laws.

For complete security documentation, see SECURITY.md

4. Installation

3.1 Automatic Installation via OpenClaw

This skill is configured for automatic dependency installation. When installed through the OpenClaw skill system, it will automatically detect and install the following dependencies:

  1. Frida Tools Suite (frida-tools) - Includes frida and frida-dexdump commands
  2. Python3 - Script runtime environment
  3. Android Debug Bridge (adb) - Device connection tool

3.2 Manual Dependency Installation

If not installed via OpenClaw, please manually install the following dependencies:

# Install Frida tools
pip install frida-tools

# Install Python3 (if not installed)
sudo apt-get install python3 python3-pip

# Install ADB
sudo apt-get install adb

# Run frida-server on Android device
# 1. Download frida-server for the corresponding architecture
# 2. Push to device: adb push frida-server /data/local/tmp/
# 3. Set permissions and run: adb shell "chmod 755 /data/local/tmp/frida-server && /data/local/tmp/frida-server"

3.3 Skill File Structure

After installation, the skill file structure is as follows:

android-armor-breaker/
├── SKILL.md              # Skill documentation
├── _meta.json            # Skill metadata
├── LICENSE               # MIT License
├── scripts/              # Execution scripts directory
│   ├── android-armor-breaker          # Main wrapper script
│   ├── apk_protection_analyzer.py     # APK reinforcement analyzer
│   ├── enhanced_dexdump_runner.py     # Enhanced unpacking executor (Frida-based)
│   ├── root_memory_extractor.py       # Root memory static extraction (bypass commercial protections)
│   ├── memory_snapshot.py             # Memory snapshot attack (gdbserver + root fallback)
│   ├── antidebug_bypass.py            # Anti-debug bypass module
│   ├── bangcle_bypass.js              # Bangcle reinforcement bypass script
│   ├── bangcle_bypass_runner.py       # Bangcle bypass runner
│   ├── frida_memory_scanner.js        # Frida memory scanner utility
│   └── libDexHelper_original.so       # Reference library for Bangcle analysis
└── .clawhub/             # ClawHub publishing configuration
    └── origin.json       # Publishing source information

5. Usage Strategies

5.1 Recommended Workflow

Based on protection analysis results, follow this decision tree:

1. Analyze APK reinforcement:
   python3 scripts/apk_protection_analyzer.py --apk <apk_file>

2. Select unpacking strategy:
   - No reinforcement or basic protection → Use Frida-based unpacking
   - Commercial reinforcement (IJIAMI, Bangcle, 360, Tencent) → Use Root memory extraction
   - Extreme anti-debug (app crashes immediately) → Use Memory snapshot attack

3. Execute selected strategy:
   # Frida-based (standard)
   ./scripts/android-armor-breaker --package <package_name>

   # Root memory extraction (bypass commercial protections)
   python3 scripts/root_memory_extractor.py --package <package_name>

   # Memory snapshot (for crashing apps)
   python3 scripts/memory_snapshot.py --package <package_name>

5.2 Root Memory Extraction - The Ultimate Bypass

The Root Memory Extractor is the most powerful tool against commercial reinforcements:

Key Advantages:

  • Complete bypass: No application-layer detection (Frida scripts are not used)
  • Static analysis: Reads memory directly via /proc/<PID>/mem
  • High success rate: 95%+ for all commercial protections (with root access)
  • Proven against: IJIAMI (爱加密), Bangcle (梆梆), 360 (360加固), Tencent (腾讯加固)

Usage Example:

# 1. Ensure device has root access
adb shell su -c "echo root_ok"

# 2. Run root memory extractor
python3 scripts/root_memory_extractor.py --package com.target.app --verbose

# 3. Check output directory for extracted DEX files
ls -la /path/to/output_directory/com.target.app_root_unpacked/

Technical Details:

  • Locates DEX memory regions via /proc/<PID>/maps (searching for anon:dalvik-DEX data)
  • Extracts all readable regions using dd if=/proc/<PID>/mem
  • Intelligently combines regions and crops to exact DEX size
  • Validates DEX structure integrity before saving

5.3 Success Rates by Protection Type (Updated: 2026-04-10)

Reinforcement VendorFrida-basedEnhanced Frida (v2.2.0)Root MemoryVDEX SupportNotes
No reinforcement98%98%95%N/AFrida is faster
IJIAMI (爱加密)30-50%70-85%95%+N/AEnhanced Frida improves success significantly
Bangcle (梆梆)10-20%50-65%90%+N/AStill challenging, root recommended
360加固80%85-90%95%+N/ABoth work well
Tencent (腾讯)75%80-85%95%+N/AEnhanced hooks improve Frida success
Baidu (百度)85%90-95%95%+N/AAlready good, minor improvement
NetEase Yidun (网易易盾)0-10%15-25%85%+YesVDEX format support added (v2.0.1)
Strong anti-debug style10-20%60-75%90%+N/AMajor improvement with enhanced anti-debug

Key Improvements with v2.2.0:

  • Strong anti-debug apps: +50% success rate with enhanced anti-debug bypass
  • IJIAMI: +35% success rate with better hiding and timing
  • Bangcle: +45% success rate with Thread.stop() and /proc file hooks
  • General: +10% success rate with comprehensive hooking strategy

Recommendation Strategy:

  1. First attempt: Enhanced Frida with anti-debug bypass
  2. If fails: Root memory extraction (bypasses all application-layer detection)
  3. If root not available: Memory snapshot attack
  4. Last resort: Static analysis of encrypted configurations

6. Recent Breakthroughs (2026-03-30)

6.1 IJIAMI Commercial Reinforcement Bypassed

Breakthrough: Successfully extracted complete DEX from Example_App_1.0.0.apk (IJIAMI commercial edition).

Method Used: Root memory extraction via /proc/<PID>/mem direct reading.

Results:

  • Main application DEX: 7.8MB, DEX version 038, structure validated
  • Third-party DEX: 5 complete DEX files (11.7MB total)
  • Total extracted: 6 DEX files, 19.5MB analyzable code

Technical Significance:

  • Proved root memory reading completely bypasses IJIAMI's anti-debug
  • Established new attack paradigm: static memory analysis > dynamic injection
  • Technique applicable to all Android reinforcements (requires root)

6.2 Skill Updates

  • Added root_memory_extractor.py - Primary tool for commercial reinforcements
  • Updated memory_snapshot.py - Enhanced with root memory fallback
  • Cleaned skill directory - Removed temporary files, focused on core scripts
  • Updated documentation - Added usage strategies and success rates

6.3 VDEX Processing Capability Enhanced (v2.0.1)

Breakthrough: Successfully extracted DEX from NetEase Yidun VDEX (Verifier DEX) format, achieving complete runtime DEX extraction for a music streaming application.

VDEX Support Added:

  1. Automatic VDEX detection - Detects vdex magic header (vdex027 format)
  2. DEX extraction from VDEX - Extracts all embedded DEX files from VDEX data
  3. Smart cropping integration - Enhanced smart_crop_dex() method with VDEX support
  4. Multiple DEX file saving - Extracts and saves all DEX files found in VDEX

Test Results (2026-03-30):

  • Music Streaming Application (VDEX protected):

    • ✅ Detected VDEX format: vdex027
    • ✅ Extracted 13 complete DEX files from 189MB VDEX data
    • ✅ Total DEX size: ≈100MB (including 71KB shell DEX)
    • ✅ All DEX files validated (DEX version 035)
  • Smart Device Control Application (Encrypted mode):

    • ✅ Root memory extraction successful (1.6GB data)
    • ⚠️ Memory encryption detected (all-zero header)
    • ✅ Demonstrated NetEase Yidun dual protection modes:
      • Mode A (Strong encryption): Memory encryption with all-zero headers
      • Mode B (VDEX optimization): VDEX format with extractable DEX

Technical Implementation:

  • New method: is_vdex_data() - VDEX format detection
  • New method: extract_dex_from_vdex() - VDEX to DEX conversion
  • Enhanced smart_crop_dex() - Auto-detects VDEX and extracts DEX
  • Byte-by-byte sliding window search - Ensures all DEX files are found
  • Validation system - Verifies DEX structure integrity before saving

Significance:

  • First OpenClaw skill with VDEX processing capability
  • Enables complete DEX extraction from NetEase Yidun commercial reinforcement
  • Establishes foundation for ART/OAT format support
  • Provides technical blueprint for future Android runtime format processing

6.4 Enhanced Anti-Debug Bypass for Strong Protections (v2.2.0 - 2026-04-10)

Breakthrough: Significantly improved anti-debug bypass capabilities targeting strong anti-debug style protections that previously caused "script has been destroyed" errors.

Enhanced Anti-Debug Features:

  1. Thread.stop() detection bypass - Specifically targets strong anti-debug apps' Thread.stop() overload detection
  2. /proc file access hiding - Hides sensitive /proc/self/status, /proc/self/maps files
  3. Tracepid system call blocking - Blocks tracepid() calls used by advanced anti-debug
  4. Enhanced Frida hiding - Better hiding of Frida threads and memory mappings
  5. Timing randomization - Random delays to bypass timing-based detection
  6. Multiple file operation hooks - Hooks fopen, open, readlink, etc. to hide debugger traces

Optimized Protection Type Detection:

  • Auto-detection: Automatically detects protection type (strong anti-debug, IJIAMI, Bangcle, etc.)
  • Targeted optimizations: Applies specific optimizations based on detected protection
  • Configuration tuning: Adjusts injection delays, heartbeat intervals for different protections

Technical Implementation:

  • Enhanced antidebug_bypass.py with strong anti-debug specific optimizations
  • Multi-layer hooking strategy (Java + Native + System)
  • Dynamic configuration based on protection type detection
  • Improved verification system with detailed results reporting

Usage Example:

# Auto-detect protection and apply optimizations
python3 scripts/antidebug_bypass.py --package com.example.app

# Force strong anti-debug optimizations
python3 scripts/antidebug_bypass.py --package com.example.app --protection-type strong_antidebug

# Test-only mode (no injection)
python3 scripts/antidebug_bypass.py --package com.target.app --test-only --verbose

Success Rate Improvement:

Protection TypeBefore v2.2.0After v2.2.0Improvement
Strong anti-debug apps10-20%60-75%+50% points
IJIAMI Commercial30-50%70-85%+35% points
Bangcle10-20%50-65%+45% points
General Protections80-90%90-95%+10% points

6.5 Handling Strong Anti-Debug Applications

Problem: Applications like Example_App_4.7.6.apk exhibit strong anti-debug protections causing:

  • "script has been destroyed" errors
  • Immediate process termination on Frida injection
  • Thread.stop() overload detection
  • /proc file scanning for debugger traces

Solution Workflow:

  1. Analysis First:

    ./scripts/android-armor-breaker analyze --apk Example_App_4.7.6.apk --verbose
    
  2. Enhanced Anti-Debug Bypass:

    python3 scripts/antidebug_bypass.py --package com.example.app \
      --protection-type strong_antidebug --verbose
    
  3. Root Memory Extraction (if Frida fails):

    python3 scripts/root_memory_extractor.py --package com.example.app \
      --verbose --output ./example_app_dex_output
    
  4. Memory Snapshot Attack (for immediate crashes):

    python3 scripts/memory_snapshot.py --package com.example.app
    

Key Techniques for Strong Anti-debug Apps:

  • Thread.stop() interception: Prevents anti-debug from terminating Frida
  • /proc file redirection: Redirects /proc/self/status to /dev/null
  • Delayed injection: 20-second delay to bypass startup detection
  • Memory mapping hiding: Hides Frida's memory regions from scans

Fallback Strategies:

  1. Primary: Enhanced Frida with anti-debug bypass
  2. Secondary: Root memory extraction (bypasses all application-layer detection)
  3. Tertiary: Memory snapshot attack (for immediately crashing apps)
  4. Last Resort: Static analysis of encrypted configs (as demonstrated with tik.tunnel.pro)

6.6 Skill Optimization Summary (2026-04-10)

Completed Optimizations:

  1. Anti-debug enhancement - Major upgrade to handle strong anti-debug style protections
  2. Internationalization completion - Full English/Chinese support in all core modules
  3. Code quality improvements - Syntax validation, import testing
  4. Documentation updates - Added strong anti-debug case study and success rates

Remaining Technical Debt:

  1. ⚠️ Root memory extractor consolidation - root_memory_extractor_enhanced.py needs evaluation
  2. ⚠️ Test suite expansion - Need comprehensive functional tests
  3. ⚠️ Performance optimization - Large memory dump processing can be optimized

Future Roadmap:

  1. Q2 2026: Consolidate root memory extraction scripts
  2. Q2 2026: Add automated test suite with mock APKs
  3. Q3 2026: Enhance VDEX/ART/OAT format support
  4. Q3 2026: Add AI-assisted unpacking strategy selection

Current Status:

  • Overall Health: ✅ Good (8.2/10)
  • Strong Anti-debug Success Rate: ⚠️ Moderate (60-75% with new enhancements)
  • Code Maintainability: ✅ Good
  • Documentation: ✅ Comprehensive
  • Internationalization: ✅ Complete

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

ZipCracker

CTF-oriented ZIP cracking and recovery with the bundled ZipCracker engine. Use when Codex or OpenClaw needs to analyze or recover an encrypted ZIP in authori...

Registry SourceRecently Updated
5631Profile unavailable
Security

web-recon

Website vulnerability scanner and security audit toolkit. Scan any website for security issues: open ports (nmap), exposed secrets, subdomain enumeration, di...

Registry SourceRecently Updated
5181Profile unavailable
Security

RedPincer — AI Red Team Suite

AI/LLM red team testing skill. Point at any LLM API endpoint and run automated security assessments. 160+ attack payloads across prompt injection, jailbreak,...

Registry SourceRecently Updated
6030Profile unavailable
Security

JEP Guard

JEP Guard intercepts high-risk commands, requires user confirmation, issues temporary tokens, and logs actions with exportable audit receipts.

Registry SourceRecently Updated
4791Profile unavailable