diff --git a/README.md b/README.md index a92970b..64cec33 100644 --- a/README.md +++ b/README.md @@ -105,7 +105,6 @@ A collection of Android security-related resources. 1. [Android Security Evaluation Framework](https://code.google.com/p/asef/) - not under active development anymore 1. [Aurasium](https://github.com/xurubin/aurasium) – Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor. 1. [Android Linux Kernel modules](https://github.com/strazzere/android-lkms) -1. [Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on a USB stick or smartphone. This is a one-stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines. 1. [StaDynA](https://github.com/zyrikby/StaDynA) - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information. 1. [DroidAnalytics](https://github.com/zhengmin1989/DroidAnalytics) - incomplete 1. [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis @@ -119,6 +118,7 @@ A collection of Android security-related resources. 1. [Android_application_analyzer](https://github.com/NotSoSecure/android_application_analyzer) - The tool is used to analyze the content of the Android application in local storage. 1. [Decompiler.com](https://www.decompiler.com/) - Online APK and Java decompiler 1. [friTap](https://github.com/fkie-cad/friTap)- - Intercept SSL/TLS connections with Frida; Allows TLS key extraction and decryption of TLS payload as PCAP on Android in real-time. +~~1. [Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on a USB stick or smartphone. This is a one-stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.~~ 1. ~~[Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals~~ 1. ~~[Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (Linux distro) Earlier it use to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.php)~~ 1. ~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore~~ @@ -257,7 +257,7 @@ A collection of Android security-related resources. 1. [androguard - Database Android Malware wiki](https://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares) 1. [Android Malware Github repo](https://github.com/ashishb/android-malware) -1. [Android Malware Genome Project](http://www.malgenomeproject.org/policy.html) - contains 1260 malware samples categorized into 49 different malware families, free for research purposes. +1. [Android Malware Genome Project](http://www.malgenomeproject.org/) - contains 1260 malware samples categorized into 49 different malware families, free for research purposes. 1. [Contagio Mobile Malware Mini Dump](http://contagiominidump.blogspot.com) 1. [Drebin](https://www.sec.tu-bs.de/~danarp/drebin/) 1. [Hudson Rock](https://www.hudsonrock.com/threat-intelligence-cybercrime-tools) - Free cybercrime intelligence toolset that can indicate if a specific APK package was compromised in an Infostealer malware attack. diff --git a/run_awesome_bot.sh b/run_awesome_bot.sh index 8689e6d..da6d901 100755 --- a/run_awesome_bot.sh +++ b/run_awesome_bot.sh @@ -35,7 +35,8 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/', 'https://apkpure.com',\ 'https://approver.talos-sec.com',\ 'https://wiki.sei.cmu.edu/confluence/display/android/Android+Secure+Coding+Standard',\ -'https://web.archive.org/web/20180721134044/http://www.fasteque.com:80/android-reverse-engineering-101-part-1/' +'https://web.archive.org/web/20180721134044/http://www.fasteque.com:80/android-reverse-engineering-101-part-1/',\ +'https://manifestsecurity.com/appie/' FLAKY_URLS='http://safe.ijiami.cn/',\ 'https://apkcombo.com/apk-downloader/',\