mirror of
https://github.com/ashishb/android-security-awesome.git
synced 2024-12-18 11:36:09 +00:00
First version.
This commit is contained in:
parent
eab0e7c3e9
commit
9d6bec9444
93
README.md
93
README.md
@ -1,4 +1,95 @@
|
|||||||
android-security-awesome
|
android-security-awesome
|
||||||
========================
|
========================
|
||||||
|
|
||||||
A collection of android security related resources
|
A collection of android security related resources.
|
||||||
|
|
||||||
|
A lot of work is happening in academia and industry on tools to perform dynamic analysis, static analysis and reverse engineering of android apps.
|
||||||
|
|
||||||
|
|
||||||
|
## ONLINE ANALYZERS
|
||||||
|
|
||||||
|
1. [AndroTotal](http://andrototal.org/)
|
||||||
|
2. [Anubis](http://anubis.iseclab.org/)
|
||||||
|
3. [App 360 scan](http://www.app360scan.com/)
|
||||||
|
4. [CopperDroid](http://copperdroid.isg.rhul.ac.uk/copperdroid/)
|
||||||
|
5. [Comdroid](http://www.comdroid.org/)
|
||||||
|
6. [Dexter](https://dexter.bluebox.com/)
|
||||||
|
7. [Foresafe](http://www.foresafe.com/scan)
|
||||||
|
8. [Mobile app insight](http://www.mobile-app-insight.org)
|
||||||
|
9. [Mobile-Sandbox](http://mobile-sandbox.com)
|
||||||
|
10. [Sandroid](http://sanddroid.xjtu.edu.cn/)
|
||||||
|
11. [Tracedroid](http://tracedroid.few.vu.nl/)
|
||||||
|
12. [Visual Threat](http://www.visualthreat.com/)
|
||||||
|
13. [Android Sandbox](http://www.androidsandbox.net/) – seems to be dead now
|
||||||
|
14. [Stowaway](http://www.android-permissions.org/) – seems to be dead now
|
||||||
|
|
||||||
|
|
||||||
|
## STATIC ANALYSIS TOOLS
|
||||||
|
|
||||||
|
1. [Android Decompiler](http://www.android-decompiler.com/) – not free
|
||||||
|
2. [Androwarn](https://github.com/maaaaz/androwarn/)
|
||||||
|
3. [ApkAnalyser](https://github.com/sonyxperiadev/ApkAnalyser)
|
||||||
|
4. [APKInspector](https://github.com/honeynet/apkinspector/)
|
||||||
|
5. [Droid Intent Data Flow Analysis for Information Leakage](https://www.cert.org/secure-coding/tools/didfail.cfm)
|
||||||
|
6. [Several tools from PSU](http://siis.cse.psu.edu/tools.html)
|
||||||
|
7. [Smali CFG generator](http://code.google.com/p/smali-cfgs/)
|
||||||
|
|
||||||
|
## DYNAMIC ANALYSIS TOOLS
|
||||||
|
|
||||||
|
1. [Android DBI frameowork](http://www.mulliner.org/blog/blosxom.cgi/security/androiddbiv02.html)
|
||||||
|
2. [Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (linux distro) Earlier it use to be an online analyzer at http://dunkelheit.com.br/amat/analysis/index_en.html
|
||||||
|
3. [Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) does not seem to be under active development anymore
|
||||||
|
4. [Android Security Evaluation Framework](https://code.google.com/p/asef/)
|
||||||
|
5. [AppUse](https://appsec-labs.com/AppUse) – custom build for pentesting
|
||||||
|
6. [AuditdAndroid](https://github.com/nwhusted/AuditdAndroid) – android port of auditd, does not seem to be active development anymore
|
||||||
|
7. [Cobradroid](http://thecobraden.com/projects/cobradroid/) – custom image for malware analysis
|
||||||
|
8. [Crowdroid](http://www.ida.liu.se/labs/rtslab/publications/2011/spsm11-burguera.pdf) – unable to find the actual tool
|
||||||
|
9. [Droidbox](http://code.google.com/p/droidbox/)
|
||||||
|
10. [Mercury](http://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/)
|
||||||
|
11. [Drozer](https://labs.mwrinfosecurity.com/tools/drozer/)
|
||||||
|
12. [Taintdroid](http://appanalysis.org/download.html) - requires AOSP compilation
|
||||||
|
13. [Xposed](http://forum.xda-developers.com/showthread.php?t=1574401) - equivalent of doing Stub based code injection but without any modifications to the binary
|
||||||
|
14. [Aurasium](http://www.aurasium.com/) – rewrites the android app to add security policy, seems dead now
|
||||||
|
|
||||||
|
## REVERSE ENGINEERING
|
||||||
|
|
||||||
|
1. [Smali/Baksmali](http://code.google.com/p/smali/) – apk decompilation
|
||||||
|
3. [emacs syntax coloring for smali files](https://github.com/strazzere/Emacs-Smali)
|
||||||
|
4. [vim syntax coloring for smali files](http://codetastrophe.com/smali.vim)
|
||||||
|
5. [AndBug](https://github.com/swdunlop/AndBug)
|
||||||
|
6. [Androguard](http://code.google.com/p/androguard/) – powerful, integrates well with other tools
|
||||||
|
7. [Apktool](http://code.google.com/p/android-apktool/) – really useful for compilation/decompilation (uses smali)
|
||||||
|
8. [Android Framework for Exploitation](https://github.com/xysec/AFE)
|
||||||
|
9. [Bypass signature and permission checks for IPCs](https://github.com/iSECPartners/Android-KillPermAndSigChecks)
|
||||||
|
10. [Android OpenDebug](https://github.com/iSECPartners/Android-OpenDebug) – make any application on device debuggable (using cydia substrate).
|
||||||
|
11. [Dare](http://siis.cse.psu.edu/dare/index.html) – .dex to .class converter
|
||||||
|
12. [Dex2Jar](http://code.google.com/p/dex2jar/)
|
||||||
|
13. [Dedexer](http://dedexer.sourceforge.net)
|
||||||
|
14. [Fino](https://github.com/sysdream/fino)
|
||||||
|
15. [Indroid](https://bitbucket.org/aseemjakhar/indroid) – thread injection kit
|
||||||
|
16. [IntentFuzzer](https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)
|
||||||
|
17. [IntentSniffer](https://www.isecpartners.com/tools/mobile-security/intent-sniffer.aspx)
|
||||||
|
18. [Introspy](https://github.com/iSECPartners/Introspy-Android)
|
||||||
|
19. [Jad]( http://www.varaneckas.com/jad)
|
||||||
|
20. [JD-GUI](http://java.decompiler.free.fr/?q=jdgui)
|
||||||
|
21. [Redexer](https://github.com/plum-umd/redexer) – apk manipulation
|
||||||
|
22. [Smali viewer](http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip)
|
||||||
|
|
||||||
|
## SAMPLE SOURCES
|
||||||
|
|
||||||
|
1. [contagio mini dump](http://contagiominidump.blogspot.com)
|
||||||
|
2. [Open Source database](http://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares)
|
||||||
|
|
||||||
|
## MISC TOOLS/READINGS
|
||||||
|
|
||||||
|
1. [smalihook](http://androidcracking.blogspot.com/2011/03/original-smalihook-java-source.html)
|
||||||
|
2. [APK-Downloader](http://codekiem.com/2012/02/24/apk-downloader/)
|
||||||
|
3. [AXMLPrinter2](http://code.google.com/p/android4me/downloads/detail?name=AXMLPrinter2.jar) - to convert binary XML files to human-readable XML files
|
||||||
|
4. [adb autocomplete](http://romannurik-code.googlecode.com/git/misc/bash_completion/adb)
|
||||||
|
5. [Dalvik opcodes](http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html)
|
||||||
|
6. [Opcodes table for quick reference](http://xchg.info/corkami/opcodes_tables.pdf)
|
||||||
|
7. [A good collection of static analysis papers](http://tthtlc.wordpress.com/2011/09/01/static-analysis-of-android-applications/)
|
||||||
|
8. [ExploitMe](http://securitycompass.github.io/AndroidLabs/setup.html) - for practice
|
||||||
|
9. [GoatDroid](https://github.com/jackMannino/OWASP-GoatDroid-Project) - for practice
|
||||||
|
10. [Android Labs](http://securitycompass.github.io/AndroidLabs/setup.html) - for practice
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user