From 6f634b49b07d1b5146ef6ade93cf365125f3e563 Mon Sep 17 00:00:00 2001 From: Ashish Bhatia Date: Fri, 12 Jun 2020 12:12:36 -0700 Subject: [PATCH] Add AndroPyTool This was suggested in https://github.com/ashishb/android-security-awesome/pull/115 --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 5ed5b3b..b114f21 100644 --- a/README.md +++ b/README.md @@ -100,6 +100,7 @@ A collection of android security related resources. 30. [Taintdroid](http://appanalysis.org) - requires AOSP compilation 31. [ARTist](https://artist.cispa.saarland) - a flexible open source instrumentation and hybrid analysis framework for Android apps and Android's java middleware. It is based on the Android Runtime's (ART) compiler and modifies code during on-device compilation. 32. [Android Malware Sandbox](https://github.com/Areizen/Android-Malware-Sandbox) +33. [AndroPyTool](https://github.com/alexMyG/AndroPyTool) - a tool for extracting static and dynamic features from Android APKs. It combines different well-known Android apps analysis tools such as DroidBox, FlowDroid, Strace, AndroGuard or VirusTotal analysis. 3. ~~[Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (linux distro) Earlier it use to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.php)~~ 31. ~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore~~ 31. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~