mirror of
https://github.com/ashishb/android-security-awesome.git
synced 2024-12-18 19:46:09 +00:00
commit
2c9fef4d1e
68
README.md
68
README.md
@ -3,10 +3,15 @@ android-security-awesome [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome
|
|||||||
|
|
||||||
A collection of android security related resources.
|
A collection of android security related resources.
|
||||||
|
|
||||||
A lot of work is happening in academia and industry on tools to perform dynamic analysis, static analysis and reverse engineering of android apps.
|
1. [TOOLS](#tools)
|
||||||
|
2. [ACADEMIC / RESEARCH / PUBLICATIONS / BOOKS](#academic)
|
||||||
|
3. [EXPLOITS / VULNERABILITIES / BUGS](#exploits)
|
||||||
|
|
||||||
|
----
|
||||||
|
#<a name="tools"></a>TOOLS
|
||||||
|
|
||||||
## ONLINE ANALYZERS
|
Online Analyzers
|
||||||
|
----
|
||||||
|
|
||||||
1. [AndroTotal](http://andrototal.org/)
|
1. [AndroTotal](http://andrototal.org/)
|
||||||
* [Dexter](https://dexter.dexlabs.org/)
|
* [Dexter](https://dexter.dexlabs.org/)
|
||||||
@ -34,7 +39,8 @@ A lot of work is happening in academia and industry on tools to perform dynamic
|
|||||||
* ~~[Android Sandbox](http://www.androidsandbox.net/)~~
|
* ~~[Android Sandbox](http://www.androidsandbox.net/)~~
|
||||||
* ~~[Foresafe](http://www.foresafe.com/scan)~~
|
* ~~[Foresafe](http://www.foresafe.com/scan)~~
|
||||||
|
|
||||||
## STATIC ANALYSIS TOOLS
|
Static Analysis Tools
|
||||||
|
----
|
||||||
|
|
||||||
1. [Androwarn](https://github.com/maaaaz/androwarn/) - detect and warn the user about potential malicious behaviours developped by an Android application.
|
1. [Androwarn](https://github.com/maaaaz/androwarn/) - detect and warn the user about potential malicious behaviours developped by an Android application.
|
||||||
* [ApkAnalyser](https://github.com/sonyxperiadev/ApkAnalyser)
|
* [ApkAnalyser](https://github.com/sonyxperiadev/ApkAnalyser)
|
||||||
@ -53,7 +59,8 @@ A lot of work is happening in academia and industry on tools to perform dynamic
|
|||||||
* [SPARTA](http://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](http://types.cs.washington.edu/checker-framework/)
|
* [SPARTA](http://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](http://types.cs.washington.edu/checker-framework/)
|
||||||
* [ConDroid](https://github.com/JulianSchuette/ConDroid) - Performs a combination of symoblic + concrete execution of the app
|
* [ConDroid](https://github.com/JulianSchuette/ConDroid) - Performs a combination of symoblic + concrete execution of the app
|
||||||
|
|
||||||
## APP VULNERABILITY SCANNERS
|
App Vulnerability Scanners
|
||||||
|
----
|
||||||
|
|
||||||
1. [QARK](https://github.com/linkedin/qark/) - QARK by LinkedIn is for app developers to scan app for security issues
|
1. [QARK](https://github.com/linkedin/qark/) - QARK by LinkedIn is for app developers to scan app for security issues
|
||||||
* [AndroBugs](https://github.com/AndroBugs/AndroBugs_Framework)
|
* [AndroBugs](https://github.com/AndroBugs/AndroBugs_Framework)
|
||||||
@ -61,7 +68,8 @@ A lot of work is happening in academia and industry on tools to perform dynamic
|
|||||||
* [Devknox](https://devknox.io/) - Autocorrect security issues as if it was spell check from your IDE
|
* [Devknox](https://devknox.io/) - Autocorrect security issues as if it was spell check from your IDE
|
||||||
* [JAADAS](https://github.com/flankerhqd/JAADAS) - Joint intraprocedure and interprocedure program analysis tool to find vulnerabilities in Android apps, built on Soot and Scala
|
* [JAADAS](https://github.com/flankerhqd/JAADAS) - Joint intraprocedure and interprocedure program analysis tool to find vulnerabilities in Android apps, built on Soot and Scala
|
||||||
|
|
||||||
## DYNAMIC ANALYSIS TOOLS
|
Dynamic Analysis Tools
|
||||||
|
----
|
||||||
|
|
||||||
1. [Android DBI frameowork](http://www.mulliner.org/blog/blosxom.cgi/security/androiddbiv02.html)
|
1. [Android DBI frameowork](http://www.mulliner.org/blog/blosxom.cgi/security/androiddbiv02.html)
|
||||||
2. [Androl4b](https://github.com/sh4hin/Androl4b)- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
|
2. [Androl4b](https://github.com/sh4hin/Androl4b)- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
|
||||||
@ -95,7 +103,8 @@ A lot of work is happening in academia and industry on tools to perform dynamic
|
|||||||
* [NowSecure Lab Automated](https://www.nowsecure.com/blog/2016/09/19/announcing-nowsecure-lab-automated/) - Enterprise tool for mobile app security testing both Android and iOS mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes.
|
* [NowSecure Lab Automated](https://www.nowsecure.com/blog/2016/09/19/announcing-nowsecure-lab-automated/) - Enterprise tool for mobile app security testing both Android and iOS mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes.
|
||||||
* ~~[Taintdroid](https://appanalysis.org/download.html)~~ - requires AOSP compilation
|
* ~~[Taintdroid](https://appanalysis.org/download.html)~~ - requires AOSP compilation
|
||||||
|
|
||||||
## REVERSE ENGINEERING
|
Reverse Engineering
|
||||||
|
----
|
||||||
|
|
||||||
1. [Smali/Baksmali](https://github.com/JesusFreke/smali) – apk decompilation
|
1. [Smali/Baksmali](https://github.com/JesusFreke/smali) – apk decompilation
|
||||||
* [emacs syntax coloring for smali files](https://github.com/strazzere/Emacs-Smali)
|
* [emacs syntax coloring for smali files](https://github.com/strazzere/Emacs-Smali)
|
||||||
@ -128,7 +137,8 @@ A lot of work is happening in academia and industry on tools to perform dynamic
|
|||||||
* [Bytecode viewer](https://github.com/Konloch/bytecode-viewer)
|
* [Bytecode viewer](https://github.com/Konloch/bytecode-viewer)
|
||||||
* [Radare2](https://github.com/radare/radare2)
|
* [Radare2](https://github.com/radare/radare2)
|
||||||
|
|
||||||
## FUZZ TESTING
|
Fuzz Testing
|
||||||
|
----
|
||||||
|
|
||||||
1. [IntentFuzzer](https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/)
|
1. [IntentFuzzer](https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/)
|
||||||
* [Radamsa Fuzzer](https://github.com/anestisb/radamsa-android)
|
* [Radamsa Fuzzer](https://github.com/anestisb/radamsa-android)
|
||||||
@ -137,11 +147,13 @@ A lot of work is happening in academia and industry on tools to perform dynamic
|
|||||||
* [Media Fuzzing Framework for Android](https://github.com/fuzzing/MFFA)
|
* [Media Fuzzing Framework for Android](https://github.com/fuzzing/MFFA)
|
||||||
* [AndroFuzz](https://github.com/jonmetz/AndroFuzz)
|
* [AndroFuzz](https://github.com/jonmetz/AndroFuzz)
|
||||||
|
|
||||||
## APP REPACKAGING DETECTORS
|
App Repackaging Detectors
|
||||||
|
----
|
||||||
|
|
||||||
1. [FSquaDRA](https://github.com/zyrikby/FSquaDRA) - a tool for detection of repackaged Android applications based on app resources hash comparison.
|
1. [FSquaDRA](https://github.com/zyrikby/FSquaDRA) - a tool for detection of repackaged Android applications based on app resources hash comparison.
|
||||||
|
|
||||||
## SAMPLE SOURCES
|
Sample Sources
|
||||||
|
----
|
||||||
|
|
||||||
1. [Contagio Mini Dump](http://contagiominidump.blogspot.com)
|
1. [Contagio Mini Dump](http://contagiominidump.blogspot.com)
|
||||||
2. [Android Malware Github repo](https://github.com/ashishb/android-malware)
|
2. [Android Malware Github repo](https://github.com/ashishb/android-malware)
|
||||||
@ -151,13 +163,8 @@ A lot of work is happening in academia and industry on tools to perform dynamic
|
|||||||
* [VirusTotal Malware Intelligence Service](https://www.virustotal.com/en/about/contact/) - powered by VirusTotal,not free
|
* [VirusTotal Malware Intelligence Service](https://www.virustotal.com/en/about/contact/) - powered by VirusTotal,not free
|
||||||
* ~~[Drebin](http://user.informatik.uni-goettingen.de/~darp/drebin/)~~
|
* ~~[Drebin](http://user.informatik.uni-goettingen.de/~darp/drebin/)~~
|
||||||
|
|
||||||
## READING MATERIAL
|
Market Crawlers
|
||||||
|
----
|
||||||
1. [Android Security (and Not) Internals](http://www.zhauniarovich.com/pubs.html)
|
|
||||||
* [Android security related presentations](https://github.com/jacobsoo/AndroidSlides)
|
|
||||||
* [A good collection of static analysis papers](https://tthtlc.wordpress.com/2011/09/01/static-analysis-of-android-applications/)
|
|
||||||
|
|
||||||
## MARKET CRAWLERS
|
|
||||||
|
|
||||||
1. [Google play crawler (Java)](https://github.com/Akdeniz/google-play-crawler)
|
1. [Google play crawler (Java)](https://github.com/Akdeniz/google-play-crawler)
|
||||||
* [Google play crawler (Python)](https://github.com/egirault/googleplay-api)
|
* [Google play crawler (Python)](https://github.com/egirault/googleplay-api)
|
||||||
@ -165,7 +172,8 @@ A lot of work is happening in academia and industry on tools to perform dynamic
|
|||||||
* [Aptoide downloader (Node)](https://github.com/dweinstein/node-aptoide) - download apps from Aptoide third-party Android market
|
* [Aptoide downloader (Node)](https://github.com/dweinstein/node-aptoide) - download apps from Aptoide third-party Android market
|
||||||
* [Appland downloader (Node)](https://github.com/dweinstein/node-appland) - download apps from Appland third-party Android market
|
* [Appland downloader (Node)](https://github.com/dweinstein/node-appland) - download apps from Appland third-party Android market
|
||||||
|
|
||||||
## MISC TOOLS
|
Misc Tools
|
||||||
|
----
|
||||||
|
|
||||||
1. [smalihook](http://androidcracking.blogspot.com/2011/03/original-smalihook-java-source.html)
|
1. [smalihook](http://androidcracking.blogspot.com/2011/03/original-smalihook-java-source.html)
|
||||||
* [APK-Downloader](http://codekiem.com/2012/02/24/apk-downloader/)
|
* [APK-Downloader](http://codekiem.com/2012/02/24/apk-downloader/)
|
||||||
@ -179,27 +187,45 @@ A lot of work is happening in academia and industry on tools to perform dynamic
|
|||||||
* [dockerfile/androguard](https://github.com/dweinstein/dockerfile-androguard)
|
* [dockerfile/androguard](https://github.com/dweinstein/dockerfile-androguard)
|
||||||
* [Android Vulnerability Test Suite](https://github.com/AndroidVTS/android-vts) - android-vts scans a device for set of vulnerabilities
|
* [Android Vulnerability Test Suite](https://github.com/AndroidVTS/android-vts) - android-vts scans a device for set of vulnerabilities
|
||||||
|
|
||||||
## TUTORIALS
|
----
|
||||||
|
|
||||||
|
#<a name="academic"></a>ACADEMIC / RESEARCH / PUBLICATIONS / BOOKS
|
||||||
|
|
||||||
|
Research Papers
|
||||||
|
----
|
||||||
|
1. [Android security related presentations](https://github.com/jacobsoo/AndroidSlides)
|
||||||
|
* [A good collection of static analysis papers](https://tthtlc.wordpress.com/2011/09/01/static-analysis-of-android-applications/)
|
||||||
|
|
||||||
|
Books
|
||||||
|
----
|
||||||
|
1. [SEI CERT Android Secure Coding Standard](https://www.securecoding.cert.org/confluence/display/android/Android+Secure+Coding+Standard)
|
||||||
|
|
||||||
|
Tutorials
|
||||||
|
----
|
||||||
1. [Android Reverse Engineering 101 by Daniele Altomare](http://www.fasteque.com/android-reverse-engineering-101-part-1/)
|
1. [Android Reverse Engineering 101 by Daniele Altomare](http://www.fasteque.com/android-reverse-engineering-101-part-1/)
|
||||||
|
|
||||||
# EXPLOITS / VULNERABILITIES / BUGS
|
----
|
||||||
|
|
||||||
|
#<a name="exploits"></a>EXPLOITS / VULNERABILITIES / BUGS
|
||||||
|
|
||||||
List
|
List
|
||||||
----
|
----
|
||||||
1. [Vulnerability Google Doc](https://docs.google.com/spreadsheet/pub?key=0Am5hHW4ATym7dGhFU1A4X2lqbUJtRm1QSWNRc3E0UlE&single=true&gid=0&output=html)
|
1. [Vulnerability Google Doc](https://docs.google.com/spreadsheet/pub?key=0Am5hHW4ATym7dGhFU1A4X2lqbUJtRm1QSWNRc3E0UlE&single=true&gid=0&output=html)
|
||||||
* [Root Exploits (from Drozer issue #56)](https://github.com/mwrlabs/drozer/issues/56)
|
* [Root Exploits (from Drozer issue #56)](https://github.com/mwrlabs/drozer/issues/56)
|
||||||
* [Android Security Bulletins](https://source.android.com/security/bulletin/)
|
* [Android Security Bulletins](https://source.android.com/security/bulletin/)
|
||||||
* [Android reported security vulnerabilities](https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/Google-Android.html)
|
* [Android's reported security vulnerabilities](https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/Google-Android.html)
|
||||||
* [Android Devices Security Patch Status](https://kb.androidtamer.com/Device_Security_Patch_tracker/)
|
* [Android Devices Security Patch Status](https://kb.androidtamer.com/Device_Security_Patch_tracker/)
|
||||||
|
|
||||||
Bounty Programs
|
Bounty Programs
|
||||||
----
|
----
|
||||||
1. [Android's Security Reward Program](https://www.google.com/about/appsecurity/android-rewards/)
|
1. [Android Security Reward Program](https://www.google.com/about/appsecurity/android-rewards/)
|
||||||
|
|
||||||
How to report
|
How to report
|
||||||
----
|
----
|
||||||
1. [Android - reporting security issues](https://source.android.com/security/overview/updates-resources.html#report-issues)
|
1. [Android - reporting security issues](https://source.android.com/security/overview/updates-resources.html#report-issues)
|
||||||
|
|
||||||
|
----
|
||||||
|
|
||||||
# Other Awesome Lists
|
# Other Awesome Lists
|
||||||
Other amazingly awesome lists can be found in the
|
Other amazingly awesome lists can be found in the
|
||||||
[awesome-awesomeness](https://github.com/bayandin/awesome-awesomeness) list.
|
[awesome-awesomeness](https://github.com/bayandin/awesome-awesomeness) list.
|
||||||
|
Loading…
Reference in New Issue
Block a user