Add AMDH to misc tools (#134)

* Add AMDH to misc tools

Android Mobile Device Hardening: https://github.com/SecTheTech/AMDH
This commit is contained in:
SecTheTech 2020-12-15 20:15:39 +01:00 committed by GitHub
parent 4878f48540
commit 9184e4977d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -184,9 +184,11 @@ A collection of android security related resources.
9. [AppMon](https://github.com/dpnishant/appmon)- AppMon is an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on Frida. 9. [AppMon](https://github.com/dpnishant/appmon)- AppMon is an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on Frida.
10. [Internal Blue](https://github.com/seemoo-lab/internalblue) - Bluetooth experimentation framework based on Reverse Engineering of Broadcom Bluetooth Controllers 10. [Internal Blue](https://github.com/seemoo-lab/internalblue) - Bluetooth experimentation framework based on Reverse Engineering of Broadcom Bluetooth Controllers
11. [Android Device Security Database](https://www.android-device-security.org/client/datatable) - Database of security features of Android devices 11. [Android Device Security Database](https://www.android-device-security.org/client/datatable) - Database of security features of Android devices
12. ~~[Opcodes table for quick reference](http://ww38.xchg.info/corkami/opcodes_tables.pdf)~~ 12. [Android Mobile Device Hardening](https://github.com/SecTheTech/AMDH) - AMDH scans and harden device's settings and list harmful installed Apps based on permissions.
13. ~~[APK-Downloader](http://codekiem.com/2012/02/24/apk-downloader/)~~ - seems dead now 13. ~~[Opcodes table for quick reference](http://ww38.xchg.info/corkami/opcodes_tables.pdf)~~
14. ~~[Dalvik opcodes](http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html)~~ 14. ~~[APK-Downloader](http://codekiem.com/2012/02/24/apk-downloader/)~~ - seems dead now
15. ~~[Dalvik opcodes](http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html)~~
### Vulnerable Applications for practice ### Vulnerable Applications for practice
1. [Damn Insecure Vulnerable Application (DIVA)](https://github.com/payatu/diva-android) 1. [Damn Insecure Vulnerable Application (DIVA)](https://github.com/payatu/diva-android)