Update one broken link and remove another

This commit is contained in:
Ashish Bhatia 2019-04-28 23:20:02 -05:00
parent efc6baf8b5
commit 33ed64fdb5
2 changed files with 4 additions and 3 deletions

View File

@ -96,7 +96,6 @@ A collection of android security related resources.
19. [Crowdroid](http://www.ida.liu.se/labs/rtslab/publications/2011/spsm11-burguera.pdf) unable to find the actual tool 19. [Crowdroid](http://www.ida.liu.se/labs/rtslab/publications/2011/spsm11-burguera.pdf) unable to find the actual tool
20. [AuditdAndroid](https://github.com/nwhusted/AuditdAndroid) android port of auditd, not under active development anymore 20. [AuditdAndroid](https://github.com/nwhusted/AuditdAndroid) android port of auditd, not under active development anymore
21. [Android Security Evaluation Framework](https://code.google.com/p/asef/) - not under active development anymore 21. [Android Security Evaluation Framework](https://code.google.com/p/asef/) - not under active development anymore
22. [Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) ARE (android reverse engineering) not under active development anymore
23. [Aurasium](https://github.com/xurubin/aurasium) Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor. 23. [Aurasium](https://github.com/xurubin/aurasium) Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.
24. [Android Linux Kernel modules](https://github.com/strazzere/android-lkms) 24. [Android Linux Kernel modules](https://github.com/strazzere/android-lkms)
25. [Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on USB stick or smartphone. This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines. 25. [Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on USB stick or smartphone. This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
@ -105,6 +104,7 @@ A collection of android security related resources.
28. [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis 28. [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
29. [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework 29. [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework
30. [Taintdroid](http://appanalysis.org) - requires AOSP compilation 30. [Taintdroid](http://appanalysis.org) - requires AOSP compilation
31. ~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) ARE (android reverse engineering) not under active development anymore~~
31. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~ 31. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~
32. ~~[Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/)~~ 32. ~~[Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/)~~
@ -123,7 +123,7 @@ A collection of android security related resources.
10. [Dare](http://siis.cse.psu.edu/dare/index.html) .dex to .class converter 10. [Dare](http://siis.cse.psu.edu/dare/index.html) .dex to .class converter
11. [Dex2Jar](https://github.com/pxb1988/dex2jar) - dex to jar converter 11. [Dex2Jar](https://github.com/pxb1988/dex2jar) - dex to jar converter
12. [Enjarify](https://github.com/google/enjarify) - dex to jar converter from Google 12. [Enjarify](https://github.com/google/enjarify) - dex to jar converter from Google
13. [Dedexer](http://dedexer.sourceforge.net) 13. [Dedexer](https://sourceforge.net/projects/dedexer/)
14. [Fino](https://github.com/sysdream/fino) 14. [Fino](https://github.com/sysdream/fino)
15. [Frida](https://www.frida.re/) - inject javascript to explore applications and a [GUI tool](https://github.com/antojoseph/diff-gui) for it 15. [Frida](https://www.frida.re/) - inject javascript to explore applications and a [GUI tool](https://github.com/antojoseph/diff-gui) for it
16. [Indroid](https://bitbucket.org/aseemjakhar/indroid) thread injection kit 16. [Indroid](https://bitbucket.org/aseemjakhar/indroid) thread injection kit

View File

@ -11,7 +11,8 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/',
'http://www.mobile-app-insight.org','http://anubis.iseclab.org/',\ 'http://www.mobile-app-insight.org','http://anubis.iseclab.org/',\
'http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip',\ 'http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip',\
'habo.qq.com','www.fasteque.com','http://admire.necst.it/','tracedroid.few.vu.nl',\ 'habo.qq.com','www.fasteque.com','http://admire.necst.it/','tracedroid.few.vu.nl',\
'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com' 'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com',\
'https://redmine.honeynet.org/projects/are/wiki'
FLAKY_URLS='http://safe.ijiami.cn/' FLAKY_URLS='http://safe.ijiami.cn/'
SRC_FILE=README.md SRC_FILE=README.md