mirror of
https://github.com/ashishb/android-security-awesome.git
synced 2024-12-18 19:46:09 +00:00
Add AndroPyTool
This was suggested in https://github.com/ashishb/android-security-awesome/pull/115
This commit is contained in:
parent
7d1a3950e8
commit
6f634b49b0
@ -100,6 +100,7 @@ A collection of android security related resources.
|
|||||||
30. [Taintdroid](http://appanalysis.org) - requires AOSP compilation
|
30. [Taintdroid](http://appanalysis.org) - requires AOSP compilation
|
||||||
31. [ARTist](https://artist.cispa.saarland) - a flexible open source instrumentation and hybrid analysis framework for Android apps and Android's java middleware. It is based on the Android Runtime's (ART) compiler and modifies code during on-device compilation.
|
31. [ARTist](https://artist.cispa.saarland) - a flexible open source instrumentation and hybrid analysis framework for Android apps and Android's java middleware. It is based on the Android Runtime's (ART) compiler and modifies code during on-device compilation.
|
||||||
32. [Android Malware Sandbox](https://github.com/Areizen/Android-Malware-Sandbox)
|
32. [Android Malware Sandbox](https://github.com/Areizen/Android-Malware-Sandbox)
|
||||||
|
33. [AndroPyTool](https://github.com/alexMyG/AndroPyTool) - a tool for extracting static and dynamic features from Android APKs. It combines different well-known Android apps analysis tools such as DroidBox, FlowDroid, Strace, AndroGuard or VirusTotal analysis.
|
||||||
3. ~~[Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (linux distro) Earlier it use to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.php)~~
|
3. ~~[Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (linux distro) Earlier it use to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.php)~~
|
||||||
31. ~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore~~
|
31. ~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore~~
|
||||||
31. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~
|
31. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~
|
||||||
|
Loading…
Reference in New Issue
Block a user