diff --git a/README.md b/README.md index 100f60a..1b56c20 100644 --- a/README.md +++ b/README.md @@ -50,6 +50,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic * [Madrolyzer](https://github.com/maldroid/maldrolyzer) - extracts actionable data like C&C, phone number etc. * [SPARTA](http://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](http://types.cs.washington.edu/checker-framework/) * [ConDroid](https://github.com/JulianSchuette/ConDroid) - Performs a combination of symoblic + concrete execution of the app +* [AppCritique](http://appcritique.io/) - Upload Android APKs and receive a full, free vulnerability assessment from our automated engine. ## APP VULNERABILITY SCANNERS