This project is still under development (WIP). Some scripts are not documented yet, such as the dependency installation scripts and some other files.
Shell scripts that detects ransomware activity by monitoring suspicious and normal system call patterns using strace.
grep -e 'open(.*O_RDWR' -e 'rename(.*\.encrypted' -e 'unlink(.*\.bak' strace.logopen()with write flagsrename()to suspicious extensions- Batch
unlink()operations
grep -e 'connect(.*:443' -e 'sendto(.*[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' strace.log- Outbound HTTPS connections
- Communication with unknown IPs
grep -e 'mprotect(.*PROT_EXEC' -e 'mmap(.*PROT_WRITE' strace.log- Memory protection changes
- Suspicious memory mapping
- Start monitoring:
./capture_logs.sh <com.example1>
- Linux/Unix system
- strace and tcpdump installed
- Root privileges for system-wide monitoring
#!/bin/bash
# Android Development Environment Configuration Script
# Sets paths and variables for Android SDK/NDK developmentConfigures your shell environment for Android development by:
- Setting all required SDK/NDK paths
- Preparing cross-compilation toolchain
- Verifying ADB connectivity
| Component | Path Example |
|---|---|
| Platform Tools | $ANDROID_SDK_ROOT/platform-tools |
| CMake | $ANDROID_SDK_ROOT/cmake/3.31.6/bin |
| Command Line Tools | $ANDROID_SDK_ROOT/cmdline-tools/latest/bin |
| Emulator | $ANDROID_SDK_ROOT/emulator |
| NDK | $ANDROID_SDK_ROOT/ndk/29.0.13113456 |
export TARGET=armv7a-linux-androideabi # ARM 32-bit
export API=21 # Min Android version
export CC=$TOOLCHAIN/bin/$TARGET$API-clang # C compileradb devices # Checks connected devices#!/bin/bash
# Android Device Information Script
# Collects and logs key device properties via ADBAutomatically gathers and saves essential Android device information including:
- Connected devices list
- Device model and manufacturer
- Product identifiers
- Hardware properties
| Property | ADB Command | Example Output |
|---|---|---|
| Connected Devices | adb devices |
emulator-5554 device |
| Product/Device Alias | getprop ro.product.device |
walleye |
| Device Model | getprop ro.product.model |
Pixel 2 |
| Product Name | getprop ro.product.name |
walleye |
| Manufacturer | getprop ro.product.manufacturer |
Google |
flowchart TD
A[Start] --> B[Check ADB Installation]
B --> C[Create Log File]
C --> D[Get Device List]
D --> E[Collect Device Properties]
E --> F[Save to device_info.log]
F --> G[Complete]
- Make executable:
chmod +x get_device_info.sh
- Run:
./get_device_info.sh
Creates device_info.log with content like:
Checking connected devices...
List of devices attached
emulator-5554 device
Product/Device alias:
walleye
Device Model:
Pixel 2
Product Name:
walleye
Manufacturer:
Google
- Connect only one device for clean output
- Works with both physical devices and emulators
- Add more properties by extending the script:
echo "\nAndroid Version:" | tee -a $filename adb shell getprop ro.build.version.release | tee -a $filename
If you get errors:
- Verify USB debugging is enabled
- Check
adb devicesshows your device - Ensure you've accepted the RSA key dialog
- Try restarting ADB server:
adb kill-server && adb start-server
- Requires USB debugging authorization
- Needs ADB in your PATH
- Log file is overwritten on each run
#!/bin/bash
# Android Process Finder Script
# Searches for running processes by package name/identifier- Find running Android processes by package name
- Display matching process IDs (PIDs) and names
- Handle multiple search terms in one command
- Verifies ADB is installed
- Checks for required arguments
- Searches
ps -Aoutput for each argument - Displays PID and process name for matches
./search_app.sh <com.example1> <com.example2> ...flowchart TD
A[Start] --> B{ADB Installed?}
B -->|Yes| C{Arguments Provided?}
B -->|No| D[Show Error]
C -->|Yes| E[Search Each Argument]
C -->|No| F[Show Usage]
E --> G[Display PID and Name]
G --> H[Repeat for Next Argument]
# Single package search
./search_app.sh com.google
# Multiple package search
./search_app.sh com.android chromeSearching for processes matching: com.google chrome
----------------------------------
>>> Processes containing 'com.google':
PID: 1234 Name: com.google.android.gms
PID: 5678 Name: com.google.process.gapps
----------------------------------
>>> Processes containing 'chrome':
PID: 9012 Name: com.android.chrome
----------------------------------
- Android Debug Bridge (ADB) installed
- USB debugging enabled
- Device connected and authorized
If no processes appear:
- Verify package names are correct
- Check if app is actually running
- Try broader search terms:
./search_app.sh android
Aplicativos utilizados para este projeto
org.readera com.spotify.music