You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1.[Android Decompiler](https://www.pnfsoftware.com/) – not free
61
60
1.[PSCout](https://security.csl.toronto.edu/pscout/) - A tool that extracts the permission specification from the Android OS source code using static analysis
@@ -75,6 +74,7 @@ A collection of Android security-related resources.
75
74
1.[One Step Decompiler](https://github.com/b-mueller/apkx) - Android APK Decompilation for the Lazy
76
75
1.[APKLeaks](https://github.com/dwisiswant0/apkleaks) - Scanning APK file for URIs, endpoints & secrets.
77
76
1.[Mobile Audit](https://github.com/mpast/mobileAudit) - Web application for performing Static Analysis and detecting malware in Android APKs.
1.~~[Several tools from PSU](http://siis.cse.psu.edu/tools.html)~~
79
79
80
80
### App Vulnerability Scanners
@@ -97,7 +97,6 @@ A collection of Android security-related resources.
97
97
1.[Inspeckage](https://github.com/ac-pm/Inspeckage) - Android Package Inspector - dynamic analysis with API hooks, start unexported activities, and more. (Xposed Module)
1.~~[Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals~~
101
100
1.[DECAF](https://github.com/sycurelab/DECAF) - Dynamic Executable Code Analysis Framework based on QEMU (DroidScope is now an extension to DECAF)
102
101
1.[CuckooDroid](https://github.com/idanr1986/cuckoo-droid) - Android extension for Cuckoo sandbox
103
102
1.[Mem](https://github.com/MobileForensicsResearch/mem) - Memory analysis of Android (root required)
@@ -118,6 +117,8 @@ A collection of Android security-related resources.
118
117
1.[Runtime Mobile Security (RMS)](https://github.com/m0bilesecurity/RMS-Runtime-Mobile-Security) - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
119
118
1.[PAPIMonitor](https://github.com/Dado1513/PAPIMonitor) – PAPIMonitor (Python API Monitor for Android apps) is a Python tool based on Frida for monitoring user-select APIs during the app execution.
120
119
1.[Android_application_analyzer](https://github.com/NotSoSecure/android_application_analyzer) - The tool is used to analyze the content of the Android application in local storage.
120
+
1.[Decompiler.com](https://www.decompiler.com/) - Online APK and Java decompiler
121
+
1.~~[Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals~~
121
122
1.~~[Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (Linux distro) Earlier it use to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.php)~~
122
123
1.~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore~~
123
124
1.~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~
@@ -160,11 +161,11 @@ A collection of Android security-related resources.
160
161
1.[Obfuscapk](https://github.com/ClaudiuGeorgiu/Obfuscapk) - Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code.
161
162
1.[ARMANDroid](https://github.com/Mobile-IoT-Security-Lab/ARMANDroid) - ARMAND (Anti-Repackaging through Multi-patternAnti-tampering based on Native Detection) is a novel anti-tampering protection scheme that embeds logic bombs and AT detection nodes directly in the apk file without needing their source code.
162
163
1.[MVT (Mobile Verification Toolkit)](https://github.com/mvt-project/mvt) - a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices
164
+
1.[Dexmod](https://github.com/google/dexmod) - tool to exemplify patching Dalvik bytecode in a DEX (Dalvik Executable) file, and assist in the static analysis of Android applications.
0 commit comments