Skip to content

Commit 89aed9b

Browse files
committed
chore(tms-api-server): mark more links as dead
1 parent 5385edb commit 89aed9b

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

README.md

+1-2
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,6 @@ A collection of Android security-related resources.
6262
1. [SmaliSCA](https://github.com/dorneanu/smalisca) - Smali Static Code Analysis
6363
1. [CFGScanDroid](https://github.com/douggard/CFGScanDroid) - Scans and compares CFG against CFG of malicious applications
6464
1. [Madrolyzer](https://github.com/maldroid/maldrolyzer) - extracts actionable data like C&C, phone number etc.
65-
1. [SPARTA](https://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](https://types.cs.washington.edu/checker-framework/)
6665
1. [ConDroid](https://github.com/JulianSchuette/ConDroid) - Performs a combination of symbolic + concrete execution of the app
6766
1. [DroidRA](https://github.com/serval-snt-uni-lu/DroidRA)
6867
1. [RiskInDroid](https://github.com/ClaudiuGeorgiu/RiskInDroid) - A tool for calculating the risk of Android apps based on their permissions, with an online demo available.
@@ -76,6 +75,7 @@ A collection of Android security-related resources.
7675
1. [Mobile Audit](https://github.com/mpast/mobileAudit) - Web application for performing Static Analysis and detecting malware in Android APKs.
7776
1. ~~[Smali CFG generator](https://github.com/EugenioDelfa/Smali-CFGs)~~
7877
1. ~~[Several tools from PSU](http://siis.cse.psu.edu/tools.html)~~
78+
1. ~~[SPARTA](https://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](https://types.cs.washington.edu/checker-framework/)~~
7979

8080
### App Vulnerability Scanners
8181

@@ -246,7 +246,6 @@ A collection of Android security-related resources.
246246

247247
1. [Android Security Bulletins](https://source.android.com/security/bulletin/)
248248
1. [Android's reported security vulnerabilities](https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/Google-Android.html)
249-
1. [AOSP - Issue tracker](https://code.google.com/p/android/issues/list?can=2&q=priority=Critical&sort=-opened)
250249
1. [OWASP Mobile Top 10 2016](https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10)
251250
1. [Exploit Database](https://www.exploit-db.com/search/?action=search&q=android) - click search
252251
1. [Vulnerability Google Doc](https://docs.google.com/spreadsheet/pub?key=0Am5hHW4ATym7dGhFU1A4X2lqbUJtRm1QSWNRc3E0UlE&single=true&gid=0&output=html)

run_awesome_bot.sh

+2-1
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,8 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/',
3636
'https://approver.talos-sec.com',\
3737
'https://wiki.sei.cmu.edu/confluence/display/android/Android+Secure+Coding+Standard',\
3838
'https://web.archive.org/web/20180721134044/http://www.fasteque.com:80/android-reverse-engineering-101-part-1/',\
39-
'https://manifestsecurity.com/appie/'
39+
'https://manifestsecurity.com/appie/',\
40+
'https://www.cs.washington.edu/sparta'
4041

4142
FLAKY_URLS='http://safe.ijiami.cn/',\
4243
'https://apkcombo.com/apk-downloader/',\

0 commit comments

Comments
 (0)