drozer

drozer is an open-source Android security testing framework that lets a user interact with a connected Android device/emulator by assuming the role of an app. It can enumerate and probe app components and IPC endpoints, execute modules, and install/run a drozer agent on the device (typically via adb).

Evaluated Mar 29, 2026 (0d ago)
Homepage ↗ Repo ↗ Security android mobile-security pentesting reverse-engineering assessment-framework
⚙ Agent Friendliness
32
/ 100
Can an agent use this?
🔒 Security
22
/ 100
Is it safe for agents?
⚡ Reliability
24
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
0
Documentation
55
Error Messages
0
Auth Simplicity
90
Rate Limits
0

🔒 Security

TLS Enforcement
20
Auth Strength
10
Scope Granularity
5
Dep. Hygiene
55
Secret Handling
30

Security tooling that performs exploitation/agent installation actions; use requires authorization. The interface described is local agent console communication over a forwarded TCP port, with no mention of TLS or fine-grained auth. README warns about antivirus flagging on Windows. Dependency versions are not assessed for CVEs from the provided data.

⚡ Reliability

Uptime/SLA
0
Version Stability
45
Breaking Changes
30
Error Recovery
20
AF Security Reliability

Best When

You have permission to test Android apps/devices and want an interactive framework for assessing app/OS exposure and IPC-related risks.

Avoid When

You need an API-first developer experience (REST/GraphQL/SDK) or require a vendor-hosted, authenticated service.

Use Cases

  • Assessing Android app security posture (e.g., exported components/IPC exposure) during penetration testing or app security review
  • Building and running repeatable security assessments without writing custom Android tooling
  • Exploring device/app attack surface via the drozer console and agent

Not For

  • Automated production monitoring or compliance scanning in a live environment
  • Use without an authorized target and proper legal/ethical approvals
  • Agent-assisted programmatic access to a hosted API (the primary interface is an interactive console + device agent)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
No
SDK
No
Webhooks
No

Authentication

Methods: Local console-to-device connection over a forwarded TCP port (server embedded in the agent)
OAuth: No Scopes: No

No documented user auth for a service. Access is effectively controlled by what the connected agent/process can do on the target device.

Pricing

Free tier: No
Requires CC: No

Open-source tooling; costs are primarily operational (setup, devices/emulators, analyst time). README indicates F-Secure stopped further development.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • No hosted API: interaction is via interactive CLI and an installed agent on the device.
  • Requires an adb-connected device/emulator and port forwarding (default TCP 31415).
  • README is aimed at manual use; limited info about machine-readable outputs or programmatic workflows.
  • Windows Defender/AV may flag the tool as malware; may require exclusions in your environment.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for drozer.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-29.

5347
Packages Evaluated
21056
Need Evaluation
586
Need Re-evaluation
Community Powered