mirror of
https://github.com/ashishb/android-security-awesome.git
synced 2024-12-18 11:36:09 +00:00
Update one broken link and remove another
This commit is contained in:
parent
efc6baf8b5
commit
33ed64fdb5
@ -96,7 +96,6 @@ A collection of android security related resources.
|
||||
19. [Crowdroid](http://www.ida.liu.se/labs/rtslab/publications/2011/spsm11-burguera.pdf) – unable to find the actual tool
|
||||
20. [AuditdAndroid](https://github.com/nwhusted/AuditdAndroid) – android port of auditd, not under active development anymore
|
||||
21. [Android Security Evaluation Framework](https://code.google.com/p/asef/) - not under active development anymore
|
||||
22. [Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore
|
||||
23. [Aurasium](https://github.com/xurubin/aurasium) – Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.
|
||||
24. [Android Linux Kernel modules](https://github.com/strazzere/android-lkms)
|
||||
25. [Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on USB stick or smartphone. This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
|
||||
@ -105,6 +104,7 @@ A collection of android security related resources.
|
||||
28. [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
|
||||
29. [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework
|
||||
30. [Taintdroid](http://appanalysis.org) - requires AOSP compilation
|
||||
31. ~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore~~
|
||||
31. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~
|
||||
32. ~~[Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/)~~
|
||||
|
||||
@ -123,7 +123,7 @@ A collection of android security related resources.
|
||||
10. [Dare](http://siis.cse.psu.edu/dare/index.html) – .dex to .class converter
|
||||
11. [Dex2Jar](https://github.com/pxb1988/dex2jar) - dex to jar converter
|
||||
12. [Enjarify](https://github.com/google/enjarify) - dex to jar converter from Google
|
||||
13. [Dedexer](http://dedexer.sourceforge.net)
|
||||
13. [Dedexer](https://sourceforge.net/projects/dedexer/)
|
||||
14. [Fino](https://github.com/sysdream/fino)
|
||||
15. [Frida](https://www.frida.re/) - inject javascript to explore applications and a [GUI tool](https://github.com/antojoseph/diff-gui) for it
|
||||
16. [Indroid](https://bitbucket.org/aseemjakhar/indroid) – thread injection kit
|
||||
|
@ -11,7 +11,8 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/',
|
||||
'http://www.mobile-app-insight.org','http://anubis.iseclab.org/',\
|
||||
'http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip',\
|
||||
'habo.qq.com','www.fasteque.com','http://admire.necst.it/','tracedroid.few.vu.nl',\
|
||||
'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com'
|
||||
'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com',\
|
||||
'https://redmine.honeynet.org/projects/are/wiki'
|
||||
|
||||
FLAKY_URLS='http://safe.ijiami.cn/'
|
||||
SRC_FILE=README.md
|
||||
|
Loading…
Reference in New Issue
Block a user