From 6f0cd78c5e9de99dacc684e24abd914ecc939d03 Mon Sep 17 00:00:00 2001 From: ReadmeCritic Date: Sat, 14 Nov 2015 18:07:34 -0800 Subject: [PATCH] Put back APP VULNERABILITY SCANNERS --- README.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index ecd1e5e..17e4969 100644 --- a/README.md +++ b/README.md @@ -44,7 +44,10 @@ A lot of work is happening in academia and industry on tools to perform dynamic 13. [CFGScanDroid](https://github.com/douggard/CFGScanDroid) - Scans and compares CFG against CFG of malicious applications 14. [Madrolyzer](https://github.com/maldroid/maldrolyzer) - extracts actionable data like C&C, phone number etc. 15. [SPARTA](http://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](http://checkerframework.org/) -16. [QARK](https://github.com/linkedin/qark/) - QARK by LinkedIn is for app developers to scan app for security issues + +## APP VULNERABILITY SCANNERS +1. [QARK](https://github.com/linkedin/qark/) - QARK by LinkedIn is for app developers to scan app for security issues +2. [AndroBugs](https://github.com/AndroBugs/AndroBugs_Framework) ## DYNAMIC ANALYSIS TOOLS