⚔️ WARRIOR GOOGLE APPS MAINTENANCE TOOLKIT
Zayed Shield · · Vulnerability Hunter Warrior




TABLE OF CONTENTS
- Overview
- Who This Is For
- Supported Google App Family
- Features
- Requirements
- Installation
- Usage
- Module Reference
- Libraries & Dependencies
- Error Code Reference
- ADB Setup Guide
- Community Guidelines
- Responsible Disclosure
- Author
Overview
Warrior Google Apps Maintenance Toolkit is a community-grade Termux shell toolkit for diagnosing, repairing, and updating the
Google app family on Android devices — without requiring a PC, without rooting (Tier 1) and with escalating power levels for ADB and rooted users.
It was built after real-world forensic incidents involving:
- Corrupted Google Play Store installations
- Broken Chrome profile data
- Stale Google Cloud SDK caches on Android
- Failed package updates due to permission model changes (Android 12+)
Who This Is For
| Role | Use Case |
| Android power users | Fix broken Google app installations |
| Termux developers | Keep Google SDK tools and CLI up to date |
| Security researchers | Audit local app state before reporting to Google VRP |
| IT administrators | Bulk-maintain Android devices without MDM |
| Community educatos | Demonstrate safe Android hygiene practices |
Supported Google App Family
com.android.vending → Google Play Store
com.google.android.gms → Google Play Services
com.google.android.gsf → Google Services Framework
com.chrome.android → Google Chrome (Stable)
com.chrome.because → Google Chrome Beta
com.chrome.dev → Google Chrome Dev
com.google.android.apps.docs → Google Docs
com.google.android.apps.sheets → Google Sheets
com.google.android.apps.slides → Google Slides
com.google.android.gcloud → Google Cloud SDK (Android CLI)
com.google.android.youtube → YouTube
com.google.android.gmail → Gmail
com.google.android.apps.maps → Google Maps
com.google.android.keep → Google Keep
com.google.android.drive → Google Drive
✨ Features
Tier 1 — No Root, No ADB (Termux Native)
- ✅ Detect all installed Google apps with version info
- ✅ Scan for broken/missing APK files in accessible storage
- ✅ Clear accessible cache directories under
/storage/emulated/0
- ✅ Update Google Cloud SDK (
gcloud) components
- ✅ Validate Chrome user profile integrity
- ✅ Fix corrupted Termux packages that interact with Google APIs
- ✅ Check SSL/TLS certificate chain for Google domains
- ✅ Detect unofficial or substituted app mirrors
Tier 2 — ADB Wireless
- ✅
pm clear — wipe full app data for any Google package
- ✅
pm trim-caches 999G — force system-wide cache flush
- ✅
pm grant — restore missing permissions to Google apps
- ✅
cmd package compile -m speed-profile — recompile ART cache
- ✅
am force-stop + am start — restart apps cleanly
- ✅
settings put — fix broken system flags affecting Google services
- ✅ Dump app package state for diagnosis
Tier 3 — Root Mode
- ✅ Wipe Dalvik/ART cache (forces full recompile)
- ✅ Direct
/data/data/<package>/ access for deep repair
- ✅ Fix Google Play Services database corruption (
databases/)
- ✅ Reset Google Services Framework ID (fixes activation loops)
- ✅ Restore broken system signatures in
/system/priv-app/
Requirements
Minimum (Tier 1)
Android : 8.0+ (API 26+)
Termux : Latest (from F-Droid — official build)
Storage : termux-setup-storage must be granted
Network : Active internet connection
Recommended (Tier 2)
ADB Tools : pkg install android-tools
Developer Options : USB Debugging + Wireless Debugging enabled
Full Power (Tier 3)
Root Access : Magisk / KernelSU
SuperUser : Magisk Manager or equivalent
Installation
Step 1 — Install Termux (Official Build Only)
# Download from F-Droid (NEVER from Google Play for Termux)
# https://f-droid.org/packages/com.termux/
⚠️ Security Warning: The Google Play Store version of Termux is outdated and unsupported. Always use the F-Droid build.
Step 2 — Setup Termux Environment
# Update package lists
pkg update -y && pkg upgrade -y
# Install required base tools
pkg install -y curl wget git python3 openssh android-tools
# Grant storage access (tap Allow in the popup)
termux-setup-storage
# Clone from GitHub
git clone https://github.com/asrar-mared/warrior-google-toolkit.git
cd warrior-google-toolkit
# OR direct download
curl -LO https://raw.githubusercontent.com/asrar-mared/warrior-google-toolkit/main/google_warrior.sh
Step 4 — Make Executable
chmod +x google_warrior.sh
# Verify permissions
ls -la google_warrior.sh
# Expected: -rwxr-xr-x
Usage
Interactive Mode (Recommended)
bash google_warrior.sh
The script presents a menu. Select modules individually or run all.
Full Auto Mode
bash google_warrior.sh --auto
Single Module
bash google_warrior.sh --module detect # Detect installed Google apps
bash google_warrior.sh --module repair # Repair broken packages
bash google_warrior.sh --module update # Update all components
bash google_warrior.sh --module chrome # Chrome-specific repair
bash google_warrior.sh --module play # Play Store repair
bash google_warrior.sh --module gcloud # Google Cloud SDK update
bash google_warrior.sh --module report # Generate health report
Save Output Log
bash google_warrior.sh --auto 2>&1 | tee warrior_google_$(date +%Y%m%d).log
Module Reference
MODULE 1: detect — App Inventory & Health Check
Purpose : Lists all installed Google packages with version, install date,
APK path, and health status
Commands : pm list packages, dumpsys package, pm path
Output : Color-coded table of app status (OK / BROKEN / OUTDATED)
MODULE 2: repair — Broken Package Fixer
Purpose : Detects and repairs common corruption patterns:
- Missing or zero-byte APK files
- Mismatched version codes
- Broken lib symlinks
- Missing native libraries (.so files)
Commands : pm install-existing, pm compile, pm reconcile
MODULE 3: update — Package Updater
Purpose : Updates all Google packages via available channels:
- Termux pkg/apt (for CLI tools)
- Google Cloud SDK components (gcloud components update)
- Python google-* libraries (pip)
- Node.js @google-cloud/* packages (npm)
Commands : pkg upgrade, gcloud components update, pip install --upgrade,
npm update @google-cloud/*
MODULE 4: chrome — Chrome Browser Repair
Purpose : Fixes Chrome-specific issues:
- Corrupted user profile (Default/*)
- Broken Safe Browsing database
- Stale component updates
- WebView conflicts
Commands : pm clear com.android.chrome, rm Chrome/Default/*,
adb shell cmd webviewupdate
MODULE 5: play — Google Play Store Repair
Purpose : Fixes Play Store installation failures, update loops,
and "Error retrieving information" errors.
Resets GSF ID and Play Services state.
Commands : pm clear com.android.vending, pm clear com.google.android.gms,
settings delete secure android_id (via ADB)
MODULE 6: gcloud — Google Cloud SDK Maintenance
Purpose : Updates and repairs the gcloud CLI environment:
- Component update
- Auth credential refresh
- Config validation
Commands : gcloud components update --quiet,
gcloud auth application-default login,
gcloud config list
MODULE 7: report — System Health Report
Purpose : Generates a JSON + human-readable report of:
- All Google app versions
- Permission status per app
- Cache sizes
- Battery optimization status
- Known issue fingerprints
Output : warrior_google_report_<timestamp>.json
Libraries & Dependencies
Shell / System
| Package | Purpose | Install |
android-tools | ADB + fastboot for Tier 2 | pkg install android-tools |
curl | HTTP requests, download | pkg install curl |
wget | File download | pkg install wget |
jq | JSON parsing for reports | pkg install jq |
python3 | Scripting & Google APIs | pkg install python3 |
openssh | Secure shell, key mgmt | pkg install openssh |
git | Repo management | pkg install git |
termux-api | Android system bridge | pkg install termux-api |
Python Libraries
pip install --upgrade \
google-auth \
google-auth-oauthlib \
google-auth-httplib2 \
google-api-python-client \
google-cloud-storage \
google-cloud-core \
requests \
colorama \
rich
| Library | Purpose |
google-auth | OAuth2 credential management |
google-api-python-client | Google API calls |
google-cloud-storage | GCS bucket interaction |
rich | Beautiful terminal output |
colorama | Cross-platform color output |
Node.js / npm (Optional)
npm install -g \
@google-cloud/storage \
@google-cloud/bigquery \
firebase-tools \
@angular/cli
Google Cloud SDK (gcloud)
# Install on Termux
curl https://sdk.cloud.google.com | bash
# Key components
gcloud components install \
beta \
alpha \
gsutil \
bq \
kubectl \
app-engine-python
Error Code Reference
| Error | Package | Cause | Fix Command |
INSTALL_FAILED_UPDATE_INCOMPATIBLE | Any | Signature mismatch | pm uninstall + reinstall |
Error 403 | Play Store | Account/region block | Clear GMS + reset GSF ID |
Error 910 | Play Store | Download interrupted | pm clear com.android.vending |
Error 941 | Play Store | Incompatible APK | Check CPU arch (uname -m) |
Failed transaction (2147483646) | pm shell | Android 12+ restriction | Use ADB (Tier 2) |
SecurityException: ART service | cmd compile | Needs shell UID | adb shell cmd package compile |
net::ERR_CERT_AUTHORITY_INVALID | Chrome | Expired/wrong certs | update-ca-certificates |
NETWORK_CHANGED | GMS | IP change loop | adb shell am broadcast -a android.intent.action.BOOT_COMPLETED |
DF-DFERH-01 | Play Store | Device state corrupt | Wipe Play Services data |
BM-BGRC-00 | Play Store | Billing mgr error | pm clear com.android.vending |
ADB Setup Guide
# ── STEP 1: Enable Developer Options ────────────────────────
# Settings → About Phone → Build Number (tap 7 times)
# ── STEP 2: Enable Wireless Debugging ───────────────────────
# Settings → Developer Options → Wireless Debugging → ON
# ── STEP 3: Install ADB in Termux ───────────────────────────
pkg install -y android-tools
# ── STEP 4: Pair your device ────────────────────────────────
# Settings → Wireless Debugging → Pair with pairing code
# Note the PORT and CODE shown on screen
adb pair 127.0.0.1:<PAIR_PORT>
# Enter pairing code when prompted
# ── STEP 5: Connect ─────────────────────────────────────────
adb connect 127.0.0.1:5555
# ── STEP 6: Verify ──────────────────────────────────────────
adb devices
# Expected output:
# List of devices attached
# 127.0.0.1:5555 device
# ── STEP 7: Run Toolkit ─────────────────────────────────────
bash google_warrior.sh --auto
This toolkit is open source and community-driven. Contributions are welcome.
How to Contribute
# 1. Fork the repository
# 2. Create a feature branch
git checkout -b fix/chrome-profile-repair
# 3. Make your changes with clear comments
# 4. Test on a real Android device (document your Android version)
# 5. Submit a Pull Request with:
# - Description of what you fixed
# - Android version(s) tested
# - Before/after output screenshots
Reporting Issues
Open a GitHub Issue with:
- Android version + manufacturer
- Termux version (
termux-info)
- Full error output (sanitize personal data)
- Steps to reproduce
What We Do NOT Accept
- ❌ Code that exploits remote Google services
- ❌ Unauthorized account access tools
- ❌ APK patching / signature bypass
- ❌ Anything violating Google's Terms of Service
️ Responsible Disclosure
If while using this toolkit you discover a genuine security vulnerability in Google products:
- Do NOT publish it publicly
- Report via Google VRP (Vulnerability Reward Program):
https://bughunters.google.com/report
- Include: reproduction steps, impact assessment, CVSS score estimate
- Wait for Google's acknowledgment (typically 7–90 days)
- Only disclose publicly after Google patches and approves
This toolkit author has submitted reports to Google VRP and follows responsible disclosure practices aligned with ISO/IEC 29147.
Author
Name : Vulnerability Hunter Warrior (Warrior Bug Hunter )
Alias : nike49424
Project: Zayed Shield
GitHub : github.com/asrar-mared
Email : *Emails are not allowed*
GPG : 8429D4C1ECAC3080BCB84AA0982159B70BA77EFD
Website : nike49424.live
CVE Contributions
| CVE ID | Product | CWE | Status |
| CVE-2026-29977 | PDF Complete Corporate Edition | CWE-428 (Unquoted Service Path) | ✅ Published |
| CVE-2017-18892 | Mattermost Server | HTML Neutralization | ✅ NVD + VulDB |
License
MIT License
Copyright (c) 2026 Vulnerability Hunter Warrior / Zayed Shield
Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files, to deal
in the Software without restriction, including without limitation the
rights to use, copy, modify, merge, publish, distribute, sublicense,
and/or sell copies of the Software, and to permit persons to whom the
Software is furnished to do so, subject to the following conditions:
This software is intended for lawful use on devices you own or have
explicit authorization to maintain. The author accepts no liability
for misuse.
⚔️ WARRIOR · ZAYED SHIELD · ⚔️
Built for the community. Maintained with integrity.
United Arab Emirates