Question How to scan Google Play apps for malware?

Please provide comments and solutions that are helpful to the author of this topic.
Give this a thorough look.. It will scan user apps and system apps. Its a community developed tool.


Screenshot_20251110-200723.png

Screenshot_20251110-200731.png
 
Last edited:
Great discussion! To add to the suggestions: beyond VirusTotal, consider checking these additional sources:

1. **F-Droid** - If the app is available there, it's been reviewed by the F-Droid community, which provides an additional layer of scrutiny.

2. **Check the source code** - Since ntfy is open source (available on GitHub), you can examine the actual code and build it yourself from source to verify authenticity.

3. **Monitor app permissions** - Even after installation, check what permissions the app requests. Banking trojans typically request unusual permission combinations like SMS access, contacts, or phone state.

4. **Multiple antivirus engines** - VirusTotal uses multiple engines, so getting clean results from 50+ vendors is fairly reliable. A URL check + APK upload provides good coverage.

5. **Community trust** - ntfy has been around for a while with good community backing, which is a positive sign, though not a guarantee.

The combination of sources mentioned (VirusTotal, APK mirrors, F-Droid, GitHub releases) together provides reasonable confidence. No single method is 100% foolproof, but multiple verification points significantly reduce risk.
 
Bots have been heavily backdoored in the past, so your right to be concerned. Have you tried downloading it from a APK mirror and uploading it?

Google search = APK mirror ntfy and it comes up with a few results.
No, this bot was developed by me, the issue is I want the bot to send me SMS notification in real time but I must make sure that google play store app is indeed the real one, not some fake backdoored sh*t
 
No, this bot was developed by me, the issue is I want the bot to send me SMS notification in real time but I must make sure that google play store app is indeed the real one, not some fake backdoored sh*t
Will one of you kindly show me how you know any of these have back doors. Is it something you heard, read, or do you actively use tools like Wireshark and analyze the traffic data and can actually prove this takes place? :unsure:

Im just curious about this. Are you also aware that some AI's have "Private Modes" as well?
 
  • Wow
Reactions: Studynxx
Will one of you kindly show me how you know any of these have back doors. Is it something you heard, read, or do you actively use tools like Wireshark and analyze the traffic data and can actually prove this takes place? :unsure:

Im just curious about this. Are you also aware that some AI's have "Private Modes" as well?
Isn't wireshark for the most part useless these days, as malware usually uses HTTPS? Or so I've heard
 
  • Hundred Points
Reactions: Zero Knowledge
Isn't wireshark for the most part useless these days, as malware usually uses HTTPS? Or so I've heard
The claim that Wireshark is irrelevant today because malware uses HTTPS encryption is a major misunderstanding of the tool's purpose.

While it’s true that encryption stops us from seeing the payload, or the content of the traffic, Wireshark is still essential because it captures and analyzes the unencrypted network metadata, the fundamental headers of every packet. This metadata, which includes source and destination IP addresses, port numbers, connection timing, and volume is crucial for network troubleshooting and performance analysis.

More importantly, this is exactly the data security analysts use to find backdoors and Command and Control (C2) activity. Malware traffic usually has tell-tale suspicious behaviors, such as rhythmic "beaconing" to a foreign server, connecting to known low-reputation IP addresses, or unusual use of basic protocols like DNS or ICMP. Simply put, Wireshark is not only relevant but remains the industry-standard tool for deep network forensics and debugging.

While metadata is key, there are methods to extend Wireshark's visibility to include the content of encrypted streams when necessary. Although not strictly Wireshark "plugins," other utilities are used in conjunction with it for decryption, often by acting as a Man-in-the-Middle (MitM) proxy or by exporting session keys.

Proxies such as Fiddler, Burp Suite, mitmproxy, or PolarProxy intercept, decrypt, and re-encrypt the traffic. These tools can then either export the decrypted session secrets (keys) for Wireshark to process the original capture file, or they can save the entirely decrypted traffic directly into a new PCAP file that Wireshark can read.
 
Last edited:
  • Like
Reactions: Victor M