mirror of
https://github.com/ashishb/android-security-awesome.git
synced 2024-12-18 11:36:09 +00:00
Moved 'MARA' to 'DYNAMIC ANALYSIS TOOLS'
This commit is contained in:
parent
e59a4b565e
commit
5873343954
@ -86,7 +86,8 @@ A lot of work is happening in academia and industry on tools to perform dynamic
|
|||||||
* [Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment.It is completely portable and can be carried on USB stick or smartphone.This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
|
* [Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment.It is completely portable and can be carried on USB stick or smartphone.This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
|
||||||
* [StaDynA](https://github.com/zyrikby/StaDynA) - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information.
|
* [StaDynA](https://github.com/zyrikby/StaDynA) - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information.
|
||||||
* [DroidAnalytics](https://github.com/zhengmin1989/DroidAnalytics) - incomplete
|
* [DroidAnalytics](https://github.com/zhengmin1989/DroidAnalytics) - incomplete
|
||||||
* [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
|
* [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
|
||||||
|
* [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework
|
||||||
|
|
||||||
## REVERSE ENGINEERING
|
## REVERSE ENGINEERING
|
||||||
|
|
||||||
@ -120,7 +121,6 @@ A lot of work is happening in academia and industry on tools to perform dynamic
|
|||||||
* [Simplify Android deobfuscator](https://github.com/CalebFenton/simplify)
|
* [Simplify Android deobfuscator](https://github.com/CalebFenton/simplify)
|
||||||
* [Bytecode viewer](https://github.com/Konloch/bytecode-viewer)
|
* [Bytecode viewer](https://github.com/Konloch/bytecode-viewer)
|
||||||
* [Radare2](https://github.com/radare/radare2)
|
* [Radare2](https://github.com/radare/radare2)
|
||||||
* [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework
|
|
||||||
|
|
||||||
## FUZZ TESTING
|
## FUZZ TESTING
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user