Created by x942
Released under GPLV2
New project over here
SecDroid hardens the android kernel by disable certain binaries that have internet access or can be used as an attack vector. Some of these are:
NC (net cat)
PM (Package Manager - Can't install apps via CLI/ADB)
ADBD (ADB is disabled until reboot)
And by securing the TCP Stack using Systctl (Until Next boot).
Why disable ADB and PM?
ADB and PM are both disabled to help prevent an attacker from being able to install apps via the command line or adb shell. Both of these are potential attack vectors. You can install apps via the playstore and GUI
All code is released under GPLV2 Unless otherwise noted.
Please note this is my first android app. As such bugs may be present and the code may not be pretty. If anyone can help me make it look nicer and more efficient that would be great
Version 1.1 Beta
* Fixed script to properly handled errors on some devices
* Fixed layout issue
* Added disable bluetooth feature (Disabled bluetoothd )
* Added enable bluetooth feautre ( Reverses above action)