From 69f9138cfbe8df85530e5d2c1e13706eeb1f3120 Mon Sep 17 00:00:00 2001 From: Chandrapal Date: Sat, 2 Jul 2016 22:20:17 +0530 Subject: [PATCH] Changed points to numbers --- README.md | 36 ++++++++++++++++++------------------ 1 file changed, 18 insertions(+), 18 deletions(-) diff --git a/README.md b/README.md index e1498f8..c5494c7 100644 --- a/README.md +++ b/README.md @@ -7,17 +7,17 @@ A lot of work is happening in academia and industry on tools to perform dynamic ## APP REPACKAGING DETECTORS -* [FSquaDRA](https://github.com/zyrikby/FSquaDRA) - a tool for detection of repackaged Android applications based on app resources hash comparison. +1. [FSquaDRA](https://github.com/zyrikby/FSquaDRA) - a tool for detection of repackaged Android applications based on app resources hash comparison. ## APP VULNERABILITY SCANNERS -* [AndroBugs](https://github.com/AndroBugs/AndroBugs_Framework) +1. [AndroBugs](https://github.com/AndroBugs/AndroBugs_Framework) * [Nogotofail](https://github.com/google/nogotofail) * [QARK](https://github.com/linkedin/qark/) - QARK by LinkedIn is for app developers to scan app for security issues ## DYNAMIC ANALYSIS TOOLS -* [Android DBI frameowork](http://www.mulliner.org/blog/blosxom.cgi/security/androiddbiv02.html) +1. [Android DBI frameowork](http://www.mulliner.org/blog/blosxom.cgi/security/androiddbiv02.html) * [Android Hooker](https://github.com/AndroidHooker/hooker) - API Hooking of java methods triggered by any Android application (requires the Substrate Framework) * [Android Linux Kernel modules](https://github.com/strazzere/android-lkms) * [Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (linux distro) Earlier it use to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.html) @@ -45,13 +45,13 @@ A lot of work is happening in academia and industry on tools to perform dynamic ## EXPLOITABLE VULNERABILITIES -* [Root Exploits (from Drozer issue #56)](https://github.com/mwrlabs/drozer/issues/56) +1. [Root Exploits (from Drozer issue #56)](https://github.com/mwrlabs/drozer/issues/56) * [Vulnerability Google doc](https://docs.google.com/spreadsheet/pub?key=0Am5hHW4ATym7dGhFU1A4X2lqbUJtRm1QSWNRc3E0UlE&single=true&gid=0&output=html) ## FUZZ TESTING -* [Android port of the melkor ELF fuzzer](https://github.com/anestisb/melkor-android) +1. [Android port of the melkor ELF fuzzer](https://github.com/anestisb/melkor-android) * [Honggfuzz](https://github.com/google/honggfuzz) * [IntentFuzzer](https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/) * [Media Fuzzing Framework for Android](https://github.com/fuzzing/MFFA) @@ -59,7 +59,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic ## MARKET CRAWLERS -* [Appland downloader (Node)](https://github.com/dweinstein/node-appland) - download apps from Appland third-party Android market +1. [Appland downloader (Node)](https://github.com/dweinstein/node-appland) - download apps from Appland third-party Android market * [Aptoide downloader (Node)](https://github.com/dweinstein/node-aptoide) - download apps from Aptoide third-party Android market * [Google Play Crawler (Java)](https://github.com/Akdeniz/google-play-crawler) * [Google Play Crawler (Node) ](https://github.com/dweinstein/node-google-play) - get app details and download apps from official Google Play Store. @@ -67,7 +67,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic ## ONLINE ANALYZERS -* [AndroTotal](http://andrototal.org/) +1. [AndroTotal](http://andrototal.org/) * ~~[Android Sandbox](http://www.androidsandbox.net/)~~ * ~~[Anubis](http://anubis.iseclab.org/)~~ * [AVC UnDroid](http://www.av-comparatives.org/avc-analyzer/) @@ -93,7 +93,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic ## REVERSE ENGINEERING -* [AndBug](https://github.com/swdunlop/AndBug) +1. [AndBug](https://github.com/swdunlop/AndBug) * [Androguard](https://github.com/androguard/androguard) – powerful, integrates well with other tools * [Android Framework for Exploitation](https://github.com/appknox/AFE) * [Android OpenDebug](https://github.com/iSECPartners/Android-OpenDebug) – make any application on device debuggable (using cydia substrate) @@ -125,7 +125,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic ## SAMPLE SOURCES -* [Admire](http://admire.necst.it/) +1. [Admire](http://admire.necst.it/) * [Android Malware - Github repo](https://github.com/ashishb/android-malware) * [Contagio Mini Dump](http://contagiominidump.blogspot.com) * [Drebin](http://user.informatik.uni-goettingen.de/~darp/drebin/) @@ -135,7 +135,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic ## STATIC ANALYSIS TOOLS -* [Amandroid](http://amandroid.sireum.org/) +1. [Amandroid](http://amandroid.sireum.org/) * [Android Decompiler](https://www.pnfsoftware.com/) – not free * [Androwarn](https://github.com/maaaaz/androwarn/) - detect and warn the user about potential malicious behaviours developped by an Android application. * [ApkAnalyser](https://github.com/sonyxperiadev/ApkAnalyser) @@ -151,15 +151,9 @@ A lot of work is happening in academia and industry on tools to perform dynamic * [SmaliSCA](https://github.com/dorneanu/smalisca) - Smali Static Code Analysis * [SPARTA](http://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](http://types.cs.washington.edu/checker-framework/) -## READING MATERIAL - -* [Android Security (and Not) Internals](http://www.zhauniarovich.com/pubs.html) -* [Android security related presentations](https://github.com/jacobsoo/AndroidSlides) -* [A good collection of static analysis papers](https://tthtlc.wordpress.com/2011/09/01/static-analysis-of-android-applications/) - ## MISC TOOLS -* [ADB AutoComplete](https://romannurik-code.googlecode.com/git/bash_completion/adb) +1. [ADB AutoComplete](https://romannurik-code.googlecode.com/git/bash_completion/adb) * [Android Vulnerability Test Suite](https://github.com/nowsecure/android-vts) - android-vts scans a device for set of vulnerabilities * [APK-Downloader](http://codekiem.com/2012/02/24/apk-downloader/) * [AXMLPrinter2](http://code.google.com/p/android4me/downloads/detail?name=AXMLPrinter2.jar) - to convert binary XML files to human-readable XML files @@ -171,8 +165,14 @@ A lot of work is happening in academia and industry on tools to perform dynamic * [mitmproxy](https://github.com/mitmproxy/mitmproxy) * [Smalihook](http://androidcracking.blogspot.com/2011/03/original-smalihook-java-source.html) +## READING MATERIAL + +1. [Android Security (and Not) Internals](http://www.zhauniarovich.com/pubs.html) +* [Android security related presentations](https://github.com/jacobsoo/AndroidSlides) +* [A good collection of static analysis papers](https://tthtlc.wordpress.com/2011/09/01/static-analysis-of-android-applications/) + ## TUTORIALS -* [Android Reverse Engineering 101 by Daniele Altomare](http://www.fasteque.com/android-reverse-engineering-101-part-1/) +1. [Android Reverse Engineering 101 by Daniele Altomare](http://www.fasteque.com/android-reverse-engineering-101-part-1/) # Other Awesome Lists Other amazingly awesome lists can be found in the