Moved 'MARA' to 'DYNAMIC ANALYSIS TOOLS'

This commit is contained in:
O . S . O 2016-08-11 12:00:12 +02:00 committed by GitHub
parent e59a4b565e
commit 5873343954

View File

@ -87,6 +87,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic
* [StaDynA](https://github.com/zyrikby/StaDynA) - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information.
* [DroidAnalytics](https://github.com/zhengmin1989/DroidAnalytics) - incomplete
* [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
* [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework
## REVERSE ENGINEERING
@ -120,7 +121,6 @@ A lot of work is happening in academia and industry on tools to perform dynamic
* [Simplify Android deobfuscator](https://github.com/CalebFenton/simplify)
* [Bytecode viewer](https://github.com/Konloch/bytecode-viewer)
* [Radare2](https://github.com/radare/radare2)
* [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework
## FUZZ TESTING