From 1aed7cd483947f730938ea22d32c2416b2e06195 Mon Sep 17 00:00:00 2001 From: "O . S . O" Date: Fri, 26 Aug 2016 18:14:23 +0200 Subject: [PATCH] Added 'DECAF', Updated 'Droidscope' --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 3df202e..15af107 100644 --- a/README.md +++ b/README.md @@ -73,7 +73,8 @@ A lot of work is happening in academia and industry on tools to perform dynamic * [Android Hooker](https://github.com/AndroidHooker/hooker) - Dynamic Java code instrumentation (requires the Substrate Framework) * [ProbeDroid](https://github.com/ZSShen/ProbeDroid) - Dynamic Java code instrumentation * [Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals -* [Droidscope](https://code.google.com/p/decaf-platform/wiki/DroidScope) - custom image for dynamic analysis +* [DECAF](https://github.com/sycurelab/DECAF) - Dynamic Executable Code Analysis Framework based on QEMU +* ~~[Droidscope](https://code.google.com/p/decaf-platform/wiki/DroidScope)~~ - Custom image for dynamic analysis (is now an extension to [DECAF](#decaf)) * [CuckooDroid](https://github.com/idanr1986/cuckoo-droid) - Android extension for Cuckoo sandbox * [Mem](https://github.com/MobileForensicsResearch/mem) - Memory analysis of Android (root required) * [Crowdroid](http://www.ida.liu.se/labs/rtslab/publications/2011/spsm11-burguera.pdf) – unable to find the actual tool