From 87a62b6e20d3fcd2ef24afc30ed0bb36aaf9d577 Mon Sep 17 00:00:00 2001 From: Ashish Bhatia Date: Fri, 19 Oct 2018 13:08:01 -0700 Subject: [PATCH] Minor cleanup --- README.md | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 899461d..8999627 100644 --- a/README.md +++ b/README.md @@ -85,9 +85,7 @@ Dynamic Analysis Tools 4. [Mobile-Security-Framework MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) - Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing. 5. [AppUse](https://appsec-labs.com/AppUse/) – custom build for pentesting 6. [Cobradroid](https://thecobraden.com/projects/cobradroid/) – custom image for malware analysis -7. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~ -8. [Droidbox](https://github.com/pjlantz/droidbox) -9. ~~[Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/)~~ +7. [Droidbox](https://github.com/pjlantz/droidbox) 10. [Drozer](https://github.com/mwrlabs/drozer) 11. [Xposed](https://forum.xda-developers.com/xposed/xposed-installer-versions-changelog-t2714053) - equivalent of doing Stub based code injection but without any modifications to the binary 12. [Inspeckage](https://github.com/ac-pm/Inspeckage) - Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module) @@ -109,6 +107,9 @@ Dynamic Analysis Tools 28. [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis 29. [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework 30. [Taintdroid](http://appanalysis.org) - requires AOSP compilation +31. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~ +32. ~~[Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/)~~ + Reverse Engineering ----