Android Security Auditing Platform
Live β’ Features β’ Installation β’ Usage β’ Documentation
ADB Auditor is a browser-based Android security auditing tool designed for penetration testers, security researchers, and cybersecurity professionals. It connects to Android devices via WebUSB and provides comprehensive security analysis capabilities without requiring any server-side processing.
π 100% Client-Side - All data processing happens in your browser. No data is ever uploaded to any server.
| Feature | Description |
|---|---|
| π± App Analysis | List installed applications, extract APK files, analyze permissions and signatures |
| π File Browser | Navigate device filesystem with root support, upload/download files |
| ποΈ Storage Audit | Analyze SharedPreferences, SQLite databases, identify sensitive data exposure |
| π» Shell Access | Direct ADB shell with command history and autocomplete |
| πΈ Screenshot | Capture device screen for documentation and evidence |
| π Security Scan | Automated security checks for common vulnerabilities |
| π Device Info | Comprehensive device information and system properties |
Modern, client-side Android security auditing interface with WebUSB + ADB support. Connect devices securely and perform deep analysis without uploading data.
Analyze application storage with root access, including SharedPreferences, databases, and internal files for advanced security assessments.
Full-featured file browser powered by ADB with optional root mode, enabling navigation, upload, download, and inspection of device file systems.
- Google Chrome 89+
- Microsoft Edge 89+
- Opera 75+
β οΈ Note: Firefox and Safari do not support WebUSB API
- Android device with USB Debugging enabled
- USB data cable (not charge-only)
- For full analysis: Rooted device (optional but recommended)
Visit https://adbauditor.com/
# Clone the repository
git clone https://github.com/thecybersandeep/adbauditor.git
# Navigate to directory
cd adbauditor
# Open directly in browser (recommended)
google-chrome index.html# Clone the repository
git clone https://github.com/thecybersandeep/adbauditor.git
# Navigate to directory
cd adbauditor
# Serve with any static server
python -m http.server 8080
# or
npx serve .
# or
php -S localhost:8080
# Using Docker Compose
docker-compose up -d
# Or using Docker directly
docker build -t adbauditor .
docker run -p 8080:80 adbauditor
Access at http://localhost:8080
-
Enable USB Debugging on your Android device:
- Go to
SettingsβAbout Phone - Tap
Build Number7 times to enable Developer Options - Go to
SettingsβDeveloper Options - Enable
USB Debugging
- Go to
-
Connect your device via USB cable
-
Open ADB Auditor in Chrome/Edge
-
Click "Connect" and select your device from the browser popup
-
Accept the USB debugging prompt on your device
adbauditor/
βββ js/
β βββ adb-core.js # ADB protocol implementation
β βββ app.js # Main application logic
β βββ security-auditor.js # Security scanning module
βββ img/
β βββ logo.svg # Application logo
βββ docs/
β βββ API.md # API documentation
β βββ SECURITY.md # Security considerations
βββ index.html # Main application
βββ 404.html # Error page
βββ robots.txt # SEO robots file
βββ sitemap.xml # SEO sitemap
βββ LICENSE # MIT License
βββ README.md # This file
| Shortcut | Action |
|---|---|
Ctrl + 1-6 |
Switch between tabs |
Ctrl + R |
Refresh current view |
Ctrl + D |
Disconnect device |
β / β |
Navigate shell history |
- Zero Data Upload: All processing is done locally in your browser
- No Tracking: No analytics, telemetry, or tracking of any kind
- No Account Required: Use immediately without registration
- Open Source: Full source code available for audit
- Try a different USB cable (ensure it's a data cable)
- Try a different USB port
- Revoke USB debugging authorizations and re-authorize
- Restart ADB on device:
adb kill-server && adb start-server
- Check USB cable connection
- Disable battery optimization for USB debugging
- Keep device screen on during transfer
- Enable Root toggle for protected directories
- Grant root access on device when prompted
- Some system files may still be inaccessible
This project is licensed under the License: CC BY-NC-ND 4.0
This tool is intended for authorized security testing and educational purposes only. Users are responsible for ensuring they have proper authorization before testing any device. The authors are not responsible for any misuse of this tool.
Sandeep Wawdane
- LinkedIn: @sandeepwawdane
- GitHub: @thecybersandeep
Made with β€οΈ for the Security Community
β Star this repo if you find it useful!


