OSINTDroid is a Bash-based Android forensic tool developed by Fresh Forensics. It allows you to quickly extract and analyze various types of data from an Android device using ADB (Android Debug Bridge). The tool is designed for educational purposes, privacy awareness, and mobile forensics demonstrations.
OsintDroid provides a simple, menu-driven interface with the following options:
- Number of Reboots – Retrieve the device boot count.
- List Registered Emails – Extract all emails used on the device.
- List Account Applications – Display apps associated with user accounts.
- List Phone Contacts – Retrieve all contacts with associated phone numbers.
- Dump Call Logs – Export the device’s call history.
- Dump SMS – Export SMS messages stored on the device.
- List All APKs – Show all installed applications.
- List 3rd Party Apps – Show only non-system installed applications.
- Dump Secret Codes – Enumerate Android secret codes from system packages.
- Exit – Quit the tool.
- Linux or a Bash environment
- ADB (Android Debug Bridge) installed and accessible in your system PATH
- An Android device with USB debugging enabled
- Permission to access the device via ADB
- Clone this repository:
git clone https://github.com/DouglasFreshHabian/OsintDroid.git
cd OsintDroid- Make the script executable:
chmod +x OsintDroid.sh- Connect your Android device via USB and ensure ADB debugging is enabled.
Run the script:
./OsintDroid.sh- A green banner will appear followed by the interactive menu.
- Enter the number corresponding to the action you want to perform.
- For example, entering
6will dump SMS messages to your terminal. - Option
9will enumerate Android secret codes from system packages.
- All actions are read-only and safe for educational and testing purposes on devices you own.
- Make sure USB debugging is enabled and the device authorizes your computer.
- Secret codes are system-specific; some may not return results depending on your device model and Android version.
This toolkit is for authorized forensic analysis only. Ensure compliance with local laws and privacy regulations. Unauthorized data extraction may violate legal boundaries.
If you have ideas, want to add new ADB command modules, or improve automation — open an issue or submit a pull request! Let’s build an open, transparent, and responsible forensic community.
If OsintDroid™ helps your OSINT, consider supporting continued development:
