mirror of
https://github.com/ashishb/android-security-awesome.git
synced 2025-01-31 08:37:28 +00:00
chore(tms-api-server): mark more links as dead
This commit is contained in:
parent
5385edb7b4
commit
89aed9bdb1
@ -62,7 +62,6 @@ A collection of Android security-related resources.
|
|||||||
1. [SmaliSCA](https://github.com/dorneanu/smalisca) - Smali Static Code Analysis
|
1. [SmaliSCA](https://github.com/dorneanu/smalisca) - Smali Static Code Analysis
|
||||||
1. [CFGScanDroid](https://github.com/douggard/CFGScanDroid) - Scans and compares CFG against CFG of malicious applications
|
1. [CFGScanDroid](https://github.com/douggard/CFGScanDroid) - Scans and compares CFG against CFG of malicious applications
|
||||||
1. [Madrolyzer](https://github.com/maldroid/maldrolyzer) - extracts actionable data like C&C, phone number etc.
|
1. [Madrolyzer](https://github.com/maldroid/maldrolyzer) - extracts actionable data like C&C, phone number etc.
|
||||||
1. [SPARTA](https://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](https://types.cs.washington.edu/checker-framework/)
|
|
||||||
1. [ConDroid](https://github.com/JulianSchuette/ConDroid) - Performs a combination of symbolic + concrete execution of the app
|
1. [ConDroid](https://github.com/JulianSchuette/ConDroid) - Performs a combination of symbolic + concrete execution of the app
|
||||||
1. [DroidRA](https://github.com/serval-snt-uni-lu/DroidRA)
|
1. [DroidRA](https://github.com/serval-snt-uni-lu/DroidRA)
|
||||||
1. [RiskInDroid](https://github.com/ClaudiuGeorgiu/RiskInDroid) - A tool for calculating the risk of Android apps based on their permissions, with an online demo available.
|
1. [RiskInDroid](https://github.com/ClaudiuGeorgiu/RiskInDroid) - A tool for calculating the risk of Android apps based on their permissions, with an online demo available.
|
||||||
@ -76,6 +75,7 @@ A collection of Android security-related resources.
|
|||||||
1. [Mobile Audit](https://github.com/mpast/mobileAudit) - Web application for performing Static Analysis and detecting malware in Android APKs.
|
1. [Mobile Audit](https://github.com/mpast/mobileAudit) - Web application for performing Static Analysis and detecting malware in Android APKs.
|
||||||
1. ~~[Smali CFG generator](https://github.com/EugenioDelfa/Smali-CFGs)~~
|
1. ~~[Smali CFG generator](https://github.com/EugenioDelfa/Smali-CFGs)~~
|
||||||
1. ~~[Several tools from PSU](http://siis.cse.psu.edu/tools.html)~~
|
1. ~~[Several tools from PSU](http://siis.cse.psu.edu/tools.html)~~
|
||||||
|
1. ~~[SPARTA](https://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](https://types.cs.washington.edu/checker-framework/)~~
|
||||||
|
|
||||||
### App Vulnerability Scanners
|
### App Vulnerability Scanners
|
||||||
|
|
||||||
@ -246,7 +246,6 @@ A collection of Android security-related resources.
|
|||||||
|
|
||||||
1. [Android Security Bulletins](https://source.android.com/security/bulletin/)
|
1. [Android Security Bulletins](https://source.android.com/security/bulletin/)
|
||||||
1. [Android's reported security vulnerabilities](https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/Google-Android.html)
|
1. [Android's reported security vulnerabilities](https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/Google-Android.html)
|
||||||
1. [AOSP - Issue tracker](https://code.google.com/p/android/issues/list?can=2&q=priority=Critical&sort=-opened)
|
|
||||||
1. [OWASP Mobile Top 10 2016](https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10)
|
1. [OWASP Mobile Top 10 2016](https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10)
|
||||||
1. [Exploit Database](https://www.exploit-db.com/search/?action=search&q=android) - click search
|
1. [Exploit Database](https://www.exploit-db.com/search/?action=search&q=android) - click search
|
||||||
1. [Vulnerability Google Doc](https://docs.google.com/spreadsheet/pub?key=0Am5hHW4ATym7dGhFU1A4X2lqbUJtRm1QSWNRc3E0UlE&single=true&gid=0&output=html)
|
1. [Vulnerability Google Doc](https://docs.google.com/spreadsheet/pub?key=0Am5hHW4ATym7dGhFU1A4X2lqbUJtRm1QSWNRc3E0UlE&single=true&gid=0&output=html)
|
||||||
|
@ -36,7 +36,8 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/',
|
|||||||
'https://approver.talos-sec.com',\
|
'https://approver.talos-sec.com',\
|
||||||
'https://wiki.sei.cmu.edu/confluence/display/android/Android+Secure+Coding+Standard',\
|
'https://wiki.sei.cmu.edu/confluence/display/android/Android+Secure+Coding+Standard',\
|
||||||
'https://web.archive.org/web/20180721134044/http://www.fasteque.com:80/android-reverse-engineering-101-part-1/',\
|
'https://web.archive.org/web/20180721134044/http://www.fasteque.com:80/android-reverse-engineering-101-part-1/',\
|
||||||
'https://manifestsecurity.com/appie/'
|
'https://manifestsecurity.com/appie/',\
|
||||||
|
'https://www.cs.washington.edu/sparta'
|
||||||
|
|
||||||
FLAKY_URLS='http://safe.ijiami.cn/',\
|
FLAKY_URLS='http://safe.ijiami.cn/',\
|
||||||
'https://apkcombo.com/apk-downloader/',\
|
'https://apkcombo.com/apk-downloader/',\
|
||||||
|
Loading…
Reference in New Issue
Block a user