Mark more dead URLs

This commit is contained in:
Ashish Bhatia 2019-10-24 22:02:39 -07:00
parent 2ae6a3a45d
commit 56c4f1aabc
2 changed files with 5 additions and 4 deletions

View File

@ -12,13 +12,13 @@ A collection of android security related resources.
1. [AndroTotal](http://andrototal.org/) 1. [AndroTotal](http://andrototal.org/)
5. [Appknox](https://www.appknox.com/) - not free 5. [Appknox](https://www.appknox.com/) - not free
7. [NVISO ApkScan](https://apkscan.nviso.be/)
8. [AVC UnDroid](http://undroid.av-comparatives.info/) 8. [AVC UnDroid](http://undroid.av-comparatives.info/)
10. [Virustotal](https://www.virustotal.com/) - max 128MB 10. [Virustotal](https://www.virustotal.com/) - max 128MB
11. [Fraunhofer App-ray](http://app-ray.co/) - not free 11. [Fraunhofer App-ray](http://app-ray.co/) - not free
12. [AppCritique](https://appcritique.boozallen.com) - Upload your Android APKs and receive comprehensive free security assessments. 12. [AppCritique](https://appcritique.boozallen.com) - Upload your Android APKs and receive comprehensive free security assessments.
13. [NowSecure Lab Automated](https://www.nowsecure.com/blog/2016/09/19/announcing-nowsecure-lab-automated/) - Enterprise tool for mobile app security testing both Android and iOS mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes. Not free 13. [NowSecure Lab Automated](https://www.nowsecure.com/blog/2016/09/19/announcing-nowsecure-lab-automated/) - Enterprise tool for mobile app security testing both Android and iOS mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes. Not free
14. [AMAaaS](https://amaaas.com) - Android Malware Analysis as a Service. A baremetal service features static and dynamic analysis for Android applications. A product of [MalwarePot](https://malwarepot.com/index.php/AMAaaS).Free 14. [AMAaaS](https://amaaas.com) - Free Android Malware Analysis Service. A baremetal service features static and dynamic analysis for Android applications. A product of [MalwarePot](https://malwarepot.com/index.php/AMAaaS).
15. ~~[NVISO ApkScan](https://apkscan.nviso.be/) - sunsetting on Oct 31, 2019~~
4. ~~[Mobile Malware Sandbox](http://www.mobilemalware.com.br/analysis/index_en.php)~~ 4. ~~[Mobile Malware Sandbox](http://www.mobilemalware.com.br/analysis/index_en.php)~~
6. ~~[IBM Security AppScan Mobile Analyzer](https://appscan.bluemix.net/mobileAnalyzer) - not free~~ 6. ~~[IBM Security AppScan Mobile Analyzer](https://appscan.bluemix.net/mobileAnalyzer) - not free~~
15. ~~[Visual Threat](https://www.visualthreat.com/) - no longer an Android app analyzer~~ 15. ~~[Visual Threat](https://www.visualthreat.com/) - no longer an Android app analyzer~~
@ -166,7 +166,6 @@ A collection of android security related resources.
### Misc Tools ### Misc Tools
1. [smalihook](http://androidcracking.blogspot.com/2011/03/original-smalihook-java-source.html) 1. [smalihook](http://androidcracking.blogspot.com/2011/03/original-smalihook-java-source.html)
2. [APK-Downloader](http://codekiem.com/2012/02/24/apk-downloader/)
3. [AXMLPrinter2](http://code.google.com/p/android4me/downloads/detail?name=AXMLPrinter2.jar) - to convert binary XML files to human-readable XML files 3. [AXMLPrinter2](http://code.google.com/p/android4me/downloads/detail?name=AXMLPrinter2.jar) - to convert binary XML files to human-readable XML files
4. [adb autocomplete](https://github.com/mbrubeck/android-completion) 4. [adb autocomplete](https://github.com/mbrubeck/android-completion)
5. [Dalvik opcodes](http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html) 5. [Dalvik opcodes](http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html)
@ -179,6 +178,7 @@ A collection of android security related resources.
12. [Android Vulnerability Test Suite](https://github.com/AndroidVTS/android-vts) - android-vts scans a device for set of vulnerabilities 12. [Android Vulnerability Test Suite](https://github.com/AndroidVTS/android-vts) - android-vts scans a device for set of vulnerabilities
13. [AppMon](https://github.com/dpnishant/appmon)- AppMon is an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on Frida. 13. [AppMon](https://github.com/dpnishant/appmon)- AppMon is an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on Frida.
14. [Internal Blue](https://github.com/seemoo-lab/internalblue) - Bluetooth experimentation framework based on Reverse Engineering of Broadcom Bluetooth Controllers 14. [Internal Blue](https://github.com/seemoo-lab/internalblue) - Bluetooth experimentation framework based on Reverse Engineering of Broadcom Bluetooth Controllers
15. ~~[APK-Downloader](http://codekiem.com/2012/02/24/apk-downloader/)~~ - seems dead now
## <a name="academic"></a>Academic/Research/Publications/Books ## <a name="academic"></a>Academic/Research/Publications/Books

View File

@ -14,7 +14,8 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/',
'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com',\ 'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com',\
'https://redmine.honeynet.org/projects/are/wiki','https://www.visualthreat.com/',\ 'https://redmine.honeynet.org/projects/are/wiki','https://www.visualthreat.com/',\
'http://www.mobilemalware.com.br','https://appscan.bluemix.net',\ 'http://www.mobilemalware.com.br','https://appscan.bluemix.net',\
'http://siis.cse.psu.edu/tools.html','http://siis.cse.psu.edu/dare/index.html' 'http://siis.cse.psu.edu/tools.html','http://siis.cse.psu.edu/dare/index.html',\
'http://codekiem.com/2012/02/24/apk-downloader/','https://apkscan.nviso.be'
FLAKY_URLS='http://safe.ijiami.cn/' FLAKY_URLS='http://safe.ijiami.cn/'
SRC_FILE=README.md SRC_FILE=README.md