From 33ed64fdb5b0ca781de614790cdc6e1f5ec65341 Mon Sep 17 00:00:00 2001 From: Ashish Bhatia Date: Sun, 28 Apr 2019 23:20:02 -0500 Subject: [PATCH] Update one broken link and remove another --- README.md | 4 ++-- run_awesome_bot.sh | 3 ++- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 0b39d54..3f958a8 100644 --- a/README.md +++ b/README.md @@ -96,7 +96,6 @@ A collection of android security related resources. 19. [Crowdroid](http://www.ida.liu.se/labs/rtslab/publications/2011/spsm11-burguera.pdf) – unable to find the actual tool 20. [AuditdAndroid](https://github.com/nwhusted/AuditdAndroid) – android port of auditd, not under active development anymore 21. [Android Security Evaluation Framework](https://code.google.com/p/asef/) - not under active development anymore -22. [Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore 23. [Aurasium](https://github.com/xurubin/aurasium) – Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor. 24. [Android Linux Kernel modules](https://github.com/strazzere/android-lkms) 25. [Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on USB stick or smartphone. This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines. @@ -105,6 +104,7 @@ A collection of android security related resources. 28. [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis 29. [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework 30. [Taintdroid](http://appanalysis.org) - requires AOSP compilation +31. ~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore~~ 31. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~ 32. ~~[Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/)~~ @@ -123,7 +123,7 @@ A collection of android security related resources. 10. [Dare](http://siis.cse.psu.edu/dare/index.html) – .dex to .class converter 11. [Dex2Jar](https://github.com/pxb1988/dex2jar) - dex to jar converter 12. [Enjarify](https://github.com/google/enjarify) - dex to jar converter from Google -13. [Dedexer](http://dedexer.sourceforge.net) +13. [Dedexer](https://sourceforge.net/projects/dedexer/) 14. [Fino](https://github.com/sysdream/fino) 15. [Frida](https://www.frida.re/) - inject javascript to explore applications and a [GUI tool](https://github.com/antojoseph/diff-gui) for it 16. [Indroid](https://bitbucket.org/aseemjakhar/indroid) – thread injection kit diff --git a/run_awesome_bot.sh b/run_awesome_bot.sh index 940c50e..fde4b3b 100755 --- a/run_awesome_bot.sh +++ b/run_awesome_bot.sh @@ -11,7 +11,8 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/', 'http://www.mobile-app-insight.org','http://anubis.iseclab.org/',\ 'http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip',\ 'habo.qq.com','www.fasteque.com','http://admire.necst.it/','tracedroid.few.vu.nl',\ -'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com' +'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com',\ +'https://redmine.honeynet.org/projects/are/wiki' FLAKY_URLS='http://safe.ijiami.cn/' SRC_FILE=README.md