From 6608b258a9ac8b29ec1f5a45e2859cce62785c9e Mon Sep 17 00:00:00 2001 From: "O . S . O" Date: Sun, 28 Aug 2016 21:17:57 +0200 Subject: [PATCH] Replaced 'Droidscope' by 'DECAF' --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 3df202e..100f60a 100644 --- a/README.md +++ b/README.md @@ -73,7 +73,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic * [Android Hooker](https://github.com/AndroidHooker/hooker) - Dynamic Java code instrumentation (requires the Substrate Framework) * [ProbeDroid](https://github.com/ZSShen/ProbeDroid) - Dynamic Java code instrumentation * [Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals -* [Droidscope](https://code.google.com/p/decaf-platform/wiki/DroidScope) - custom image for dynamic analysis +* [DECAF](https://github.com/sycurelab/DECAF) - Dynamic Executable Code Analysis Framework based on QEMU (DroidScope is now an extension to DECAF) * [CuckooDroid](https://github.com/idanr1986/cuckoo-droid) - Android extension for Cuckoo sandbox * [Mem](https://github.com/MobileForensicsResearch/mem) - Memory analysis of Android (root required) * [Crowdroid](http://www.ida.liu.se/labs/rtslab/publications/2011/spsm11-burguera.pdf) – unable to find the actual tool