mirror of
https://github.com/ashishb/android-security-awesome.git
synced 2024-12-18 11:36:09 +00:00
updated links
This commit is contained in:
parent
d875d835df
commit
1a869dc0e4
@ -72,8 +72,8 @@ A lot of work is happening in academia and industry on tools to perform dynamic
|
||||
* [ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)
|
||||
* [Droidbox](https://github.com/pjlantz/droidbox)
|
||||
* [Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/)
|
||||
* [Drozer](https://labs.mwrinfosecurity.com/tools/drozer/)
|
||||
* [Xposed](https://forum.xda-developers.com/showthread.php?t=1574401) - equivalent of doing Stub based code injection but without any modifications to the binary
|
||||
* [Drozer](https://github.com/mwrlabs/drozer)
|
||||
* [Xposed](https://forum.xda-developers.com/xposed/xposed-installer-versions-changelog-t2714053) - equivalent of doing Stub based code injection but without any modifications to the binary
|
||||
* [Inspeckage](https://github.com/ac-pm/Inspeckage) - Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)
|
||||
* [Android Hooker](https://github.com/AndroidHooker/hooker) - Dynamic Java code instrumentation (requires the Substrate Framework)
|
||||
* [ProbeDroid](https://github.com/ZSShen/ProbeDroid) - Dynamic Java code instrumentation
|
||||
|
Loading…
Reference in New Issue
Block a user