Merge pull request #57 from osospeed/patch-1

Added 'Inspeckage' (Xposed Module)
This commit is contained in:
Ashish Bhatia 2016-12-04 15:40:19 -08:00 committed by GitHub
commit 3604cec03f

View File

@ -71,6 +71,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic
* [Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/) * [Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/)
* [Drozer](https://labs.mwrinfosecurity.com/tools/drozer/) * [Drozer](https://labs.mwrinfosecurity.com/tools/drozer/)
* [Xposed](https://forum.xda-developers.com/showthread.php?t=1574401) - equivalent of doing Stub based code injection but without any modifications to the binary * [Xposed](https://forum.xda-developers.com/showthread.php?t=1574401) - equivalent of doing Stub based code injection but without any modifications to the binary
* [Inspeckage](https://github.com/ac-pm/Inspeckage) - Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)
* [Android Hooker](https://github.com/AndroidHooker/hooker) - Dynamic Java code instrumentation (requires the Substrate Framework) * [Android Hooker](https://github.com/AndroidHooker/hooker) - Dynamic Java code instrumentation (requires the Substrate Framework)
* [ProbeDroid](https://github.com/ZSShen/ProbeDroid) - Dynamic Java code instrumentation * [ProbeDroid](https://github.com/ZSShen/ProbeDroid) - Dynamic Java code instrumentation
* [Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals * [Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals