{"id":"reverseclabs-drozer","name":"drozer","af_score":32.5,"security_score":21.8,"reliability_score":23.8,"what_it_does":"drozer is an open-source Android security testing framework that lets a user interact with a connected Android device/emulator by assuming the role of an app. It can enumerate and probe app components and IPC endpoints, execute modules, and install/run a drozer agent on the device (typically via adb).","best_when":"You have permission to test Android apps/devices and want an interactive framework for assessing app/OS exposure and IPC-related risks.","avoid_when":"You need an API-first developer experience (REST/GraphQL/SDK) or require a vendor-hosted, authenticated service.","last_evaluated":"2026-03-29T15:00:35.744273+00:00","has_mcp":false,"has_api":false,"auth_methods":["Local console-to-device connection over a forwarded TCP port (server embedded in the agent)"],"has_free_tier":false,"known_gotchas":["No hosted API: interaction is via interactive CLI and an installed agent on the device.","Requires an adb-connected device/emulator and port forwarding (default TCP 31415).","README is aimed at manual use; limited info about machine-readable outputs or programmatic workflows.","Windows Defender/AV may flag the tool as malware; may require exclusions in your environment."],"error_quality":0.0}