From b9088bb9de54c01d90bd5f219075d41579f2634f Mon Sep 17 00:00:00 2001 From: "Amir.H Shahin" Date: Mon, 8 Aug 2016 13:46:02 +0200 Subject: [PATCH 1/2] Androl4b Androl4b added --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 64e5c1d..b0a2a40 100644 --- a/README.md +++ b/README.md @@ -36,6 +36,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic 1. [Androwarn](https://github.com/maaaaz/androwarn/) - detect and warn the user about potential malicious behaviours developped by an Android application. * [ApkAnalyser](https://github.com/sonyxperiadev/ApkAnalyser) +* [Androl4b](https://github.com/sh4hin/Androl4b)- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis * [APKInspector](https://github.com/honeynet/apkinspector/) * [Droid Intent Data Flow Analysis for Information Leakage](https://www.cert.org/secure-coding/tools/didfail.cfm) * [DroidLegacy](https://bitbucket.org/srl/droidlegacy) From e84bee1417cca8072297aca378578ee7af4b6373 Mon Sep 17 00:00:00 2001 From: "Amir.H Shahin" Date: Tue, 9 Aug 2016 14:07:56 +0200 Subject: [PATCH 2/2] Androl4b Androl4b added --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index b0a2a40..f1d73d1 100644 --- a/README.md +++ b/README.md @@ -36,7 +36,6 @@ A lot of work is happening in academia and industry on tools to perform dynamic 1. [Androwarn](https://github.com/maaaaz/androwarn/) - detect and warn the user about potential malicious behaviours developped by an Android application. * [ApkAnalyser](https://github.com/sonyxperiadev/ApkAnalyser) -* [Androl4b](https://github.com/sh4hin/Androl4b)- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis * [APKInspector](https://github.com/honeynet/apkinspector/) * [Droid Intent Data Flow Analysis for Information Leakage](https://www.cert.org/secure-coding/tools/didfail.cfm) * [DroidLegacy](https://bitbucket.org/srl/droidlegacy) @@ -61,6 +60,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic ## DYNAMIC ANALYSIS TOOLS 1. [Android DBI frameowork](http://www.mulliner.org/blog/blosxom.cgi/security/androiddbiv02.html) +2. [Androl4b](https://github.com/sh4hin/Androl4b)- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis * [Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (linux distro) Earlier it use to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.html) * [Mobile-Security-Framework MobSF](https://github.com/ajinabraham/Mobile-Security-Framework-MobSF) - Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing. * [AppUse](https://appsec-labs.com/AppUse/) – custom build for pentesting