mirror of
https://github.com/ashishb/android-security-awesome.git
synced 2024-12-18 11:36:09 +00:00
Update one broken link and remove another
This commit is contained in:
parent
efc6baf8b5
commit
33ed64fdb5
@ -96,7 +96,6 @@ A collection of android security related resources.
|
|||||||
19. [Crowdroid](http://www.ida.liu.se/labs/rtslab/publications/2011/spsm11-burguera.pdf) – unable to find the actual tool
|
19. [Crowdroid](http://www.ida.liu.se/labs/rtslab/publications/2011/spsm11-burguera.pdf) – unable to find the actual tool
|
||||||
20. [AuditdAndroid](https://github.com/nwhusted/AuditdAndroid) – android port of auditd, not under active development anymore
|
20. [AuditdAndroid](https://github.com/nwhusted/AuditdAndroid) – android port of auditd, not under active development anymore
|
||||||
21. [Android Security Evaluation Framework](https://code.google.com/p/asef/) - not under active development anymore
|
21. [Android Security Evaluation Framework](https://code.google.com/p/asef/) - not under active development anymore
|
||||||
22. [Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore
|
|
||||||
23. [Aurasium](https://github.com/xurubin/aurasium) – Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.
|
23. [Aurasium](https://github.com/xurubin/aurasium) – Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.
|
||||||
24. [Android Linux Kernel modules](https://github.com/strazzere/android-lkms)
|
24. [Android Linux Kernel modules](https://github.com/strazzere/android-lkms)
|
||||||
25. [Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on USB stick or smartphone. This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
|
25. [Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on USB stick or smartphone. This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
|
||||||
@ -105,6 +104,7 @@ A collection of android security related resources.
|
|||||||
28. [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
|
28. [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
|
||||||
29. [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework
|
29. [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework
|
||||||
30. [Taintdroid](http://appanalysis.org) - requires AOSP compilation
|
30. [Taintdroid](http://appanalysis.org) - requires AOSP compilation
|
||||||
|
31. ~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore~~
|
||||||
31. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~
|
31. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~
|
||||||
32. ~~[Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/)~~
|
32. ~~[Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/)~~
|
||||||
|
|
||||||
@ -123,7 +123,7 @@ A collection of android security related resources.
|
|||||||
10. [Dare](http://siis.cse.psu.edu/dare/index.html) – .dex to .class converter
|
10. [Dare](http://siis.cse.psu.edu/dare/index.html) – .dex to .class converter
|
||||||
11. [Dex2Jar](https://github.com/pxb1988/dex2jar) - dex to jar converter
|
11. [Dex2Jar](https://github.com/pxb1988/dex2jar) - dex to jar converter
|
||||||
12. [Enjarify](https://github.com/google/enjarify) - dex to jar converter from Google
|
12. [Enjarify](https://github.com/google/enjarify) - dex to jar converter from Google
|
||||||
13. [Dedexer](http://dedexer.sourceforge.net)
|
13. [Dedexer](https://sourceforge.net/projects/dedexer/)
|
||||||
14. [Fino](https://github.com/sysdream/fino)
|
14. [Fino](https://github.com/sysdream/fino)
|
||||||
15. [Frida](https://www.frida.re/) - inject javascript to explore applications and a [GUI tool](https://github.com/antojoseph/diff-gui) for it
|
15. [Frida](https://www.frida.re/) - inject javascript to explore applications and a [GUI tool](https://github.com/antojoseph/diff-gui) for it
|
||||||
16. [Indroid](https://bitbucket.org/aseemjakhar/indroid) – thread injection kit
|
16. [Indroid](https://bitbucket.org/aseemjakhar/indroid) – thread injection kit
|
||||||
|
@ -11,7 +11,8 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/',
|
|||||||
'http://www.mobile-app-insight.org','http://anubis.iseclab.org/',\
|
'http://www.mobile-app-insight.org','http://anubis.iseclab.org/',\
|
||||||
'http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip',\
|
'http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip',\
|
||||||
'habo.qq.com','www.fasteque.com','http://admire.necst.it/','tracedroid.few.vu.nl',\
|
'habo.qq.com','www.fasteque.com','http://admire.necst.it/','tracedroid.few.vu.nl',\
|
||||||
'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com'
|
'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com',\
|
||||||
|
'https://redmine.honeynet.org/projects/are/wiki'
|
||||||
|
|
||||||
FLAKY_URLS='http://safe.ijiami.cn/'
|
FLAKY_URLS='http://safe.ijiami.cn/'
|
||||||
SRC_FILE=README.md
|
SRC_FILE=README.md
|
||||||
|
Loading…
Reference in New Issue
Block a user