From ae05b11c40a47f4e899b7b843bced0f5ce75ad26 Mon Sep 17 00:00:00 2001 From: "Jiezhi.G" Date: Wed, 14 Oct 2015 16:15:01 +0800 Subject: [PATCH] update aurasium url --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index c40dce6..45ae04f 100644 --- a/README.md +++ b/README.md @@ -68,7 +68,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic 16. [Android Security Evaluation Framework](https://code.google.com/p/asef/) - not under active development anymore 18. [Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore 19. [Ijiami (Chinese)](http://safe.ijiami.cn/) - seems dead now -16. [Aurasium](http://www.aurasium.com/) – rewrites the android app to add security policy, seems dead now +16. [Aurasium](https://github.com/xurubin/aurasium) – Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor. 17. [Android Linux Kernel modules](https://github.com/strazzere/android-lkms) 18. 18. [Appie](http://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment.It is completely portable and can be carried on USB stick or smartphone.This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.