From 9184e4977d72bf36c59013832cb9b08f80a92504 Mon Sep 17 00:00:00 2001 From: SecTheTech <60298999+SecTheTech@users.noreply.github.com> Date: Tue, 15 Dec 2020 20:15:39 +0100 Subject: [PATCH] Add AMDH to misc tools (#134) * Add AMDH to misc tools Android Mobile Device Hardening: https://github.com/SecTheTech/AMDH --- README.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 6a9f484..79950db 100644 --- a/README.md +++ b/README.md @@ -184,9 +184,11 @@ A collection of android security related resources. 9. [AppMon](https://github.com/dpnishant/appmon)- AppMon is an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on Frida. 10. [Internal Blue](https://github.com/seemoo-lab/internalblue) - Bluetooth experimentation framework based on Reverse Engineering of Broadcom Bluetooth Controllers 11. [Android Device Security Database](https://www.android-device-security.org/client/datatable) - Database of security features of Android devices -12. ~~[Opcodes table for quick reference](http://ww38.xchg.info/corkami/opcodes_tables.pdf)~~ -13. ~~[APK-Downloader](http://codekiem.com/2012/02/24/apk-downloader/)~~ - seems dead now -14. ~~[Dalvik opcodes](http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html)~~ +12. [Android Mobile Device Hardening](https://github.com/SecTheTech/AMDH) - AMDH scans and harden device's settings and list harmful installed Apps based on permissions. +13. ~~[Opcodes table for quick reference](http://ww38.xchg.info/corkami/opcodes_tables.pdf)~~ +14. ~~[APK-Downloader](http://codekiem.com/2012/02/24/apk-downloader/)~~ - seems dead now +15. ~~[Dalvik opcodes](http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html)~~ + ### Vulnerable Applications for practice 1. [Damn Insecure Vulnerable Application (DIVA)](https://github.com/payatu/diva-android)