mirror of
https://github.com/ashishb/android-security-awesome.git
synced 2024-12-22 13:16:09 +00:00
Blacklist broken links to siis.cse.psu.edu
This commit is contained in:
parent
c80ef867d2
commit
e4f00e292f
10
README.md
10
README.md
@ -45,7 +45,6 @@ A collection of android security related resources.
|
|||||||
3. [APKInspector](https://github.com/honeynet/apkinspector/)
|
3. [APKInspector](https://github.com/honeynet/apkinspector/)
|
||||||
4. [Droid Intent Data Flow Analysis for Information Leakage](https://www.cert.org/secure-coding/tools/didfail.cfm)
|
4. [Droid Intent Data Flow Analysis for Information Leakage](https://www.cert.org/secure-coding/tools/didfail.cfm)
|
||||||
5. [DroidLegacy](https://bitbucket.org/srl/droidlegacy)
|
5. [DroidLegacy](https://bitbucket.org/srl/droidlegacy)
|
||||||
6. [Several tools from PSU](http://siis.cse.psu.edu/tools.html)
|
|
||||||
7. [Smali CFG generator](https://github.com/EugenioDelfa/Smali-CFGs)
|
7. [Smali CFG generator](https://github.com/EugenioDelfa/Smali-CFGs)
|
||||||
8. [FlowDroid](https://blogs.uni-paderborn.de/sse/tools/flowdroid/)
|
8. [FlowDroid](https://blogs.uni-paderborn.de/sse/tools/flowdroid/)
|
||||||
9. [Android Decompiler](https://www.pnfsoftware.com/) – not free
|
9. [Android Decompiler](https://www.pnfsoftware.com/) – not free
|
||||||
@ -62,6 +61,7 @@ A collection of android security related resources.
|
|||||||
20. [ClassyShark](https://github.com/google/android-classyshark) - Standalone binary inspection tool which can browse any Android executable and show important infos.
|
20. [ClassyShark](https://github.com/google/android-classyshark) - Standalone binary inspection tool which can browse any Android executable and show important infos.
|
||||||
21. [StaCoAn](https://github.com/vincentcox/StaCoAn) - Crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications. This tool was created with a big focus on usability and graphical guidance in the user interface.
|
21. [StaCoAn](https://github.com/vincentcox/StaCoAn) - Crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications. This tool was created with a big focus on usability and graphical guidance in the user interface.
|
||||||
22. [JAADAS](https://github.com/flankerhqd/JAADAS) - Joint intraprocedure and interprocedure program analysis tool to find vulnerabilities in Android apps, built on Soot and Scala
|
22. [JAADAS](https://github.com/flankerhqd/JAADAS) - Joint intraprocedure and interprocedure program analysis tool to find vulnerabilities in Android apps, built on Soot and Scala
|
||||||
|
23. ~~[Several tools from PSU](http://siis.cse.psu.edu/tools.html)~~
|
||||||
|
|
||||||
### App Vulnerability Scanners
|
### App Vulnerability Scanners
|
||||||
|
|
||||||
@ -114,7 +114,6 @@ A collection of android security related resources.
|
|||||||
7. [Android Framework for Exploitation](https://github.com/appknox/AFE)
|
7. [Android Framework for Exploitation](https://github.com/appknox/AFE)
|
||||||
8. [Bypass signature and permission checks for IPCs](https://github.com/iSECPartners/Android-KillPermAndSigChecks)
|
8. [Bypass signature and permission checks for IPCs](https://github.com/iSECPartners/Android-KillPermAndSigChecks)
|
||||||
9. [Android OpenDebug](https://github.com/iSECPartners/Android-OpenDebug) – make any application on device debuggable (using cydia substrate).
|
9. [Android OpenDebug](https://github.com/iSECPartners/Android-OpenDebug) – make any application on device debuggable (using cydia substrate).
|
||||||
10. [Dare](http://siis.cse.psu.edu/dare/index.html) – .dex to .class converter
|
|
||||||
11. [Dex2Jar](https://github.com/pxb1988/dex2jar) - dex to jar converter
|
11. [Dex2Jar](https://github.com/pxb1988/dex2jar) - dex to jar converter
|
||||||
12. [Enjarify](https://github.com/google/enjarify) - dex to jar converter from Google
|
12. [Enjarify](https://github.com/google/enjarify) - dex to jar converter from Google
|
||||||
13. [Dedexer](https://sourceforge.net/projects/dedexer/)
|
13. [Dedexer](https://sourceforge.net/projects/dedexer/)
|
||||||
@ -130,14 +129,15 @@ A collection of android security related resources.
|
|||||||
23. [Procyon](https://bitbucket.org/mstrobel/procyon/wiki/Java%20Decompiler) - Java decompiler
|
23. [Procyon](https://bitbucket.org/mstrobel/procyon/wiki/Java%20Decompiler) - Java decompiler
|
||||||
24. [FernFlower](https://github.com/fesh0r/fernflower) - Java decompiler
|
24. [FernFlower](https://github.com/fesh0r/fernflower) - Java decompiler
|
||||||
25. [Redexer](https://github.com/plum-umd/redexer) – apk manipulation
|
25. [Redexer](https://github.com/plum-umd/redexer) – apk manipulation
|
||||||
26. ~~[Smali viewer](http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip)~~
|
26. [Simplify Android deobfuscator](https://github.com/CalebFenton/simplify)
|
||||||
27. ~~[ZjDroid](https://github.com/BaiduSecurityLabs/ZjDroid)~~, ~~[fork/mirror](https://github.com/yangbean9/ZjDroid)~~
|
|
||||||
28. [Simplify Android deobfuscator](https://github.com/CalebFenton/simplify)
|
|
||||||
29. [Bytecode viewer](https://github.com/Konloch/bytecode-viewer)
|
29. [Bytecode viewer](https://github.com/Konloch/bytecode-viewer)
|
||||||
30. [Radare2](https://github.com/radare/radare2)
|
30. [Radare2](https://github.com/radare/radare2)
|
||||||
31. [Jadx](https://github.com/skylot/jadx)
|
31. [Jadx](https://github.com/skylot/jadx)
|
||||||
32. [Dwarf](https://github.com/iGio90/Dwarf) - GUI for reverse engineering
|
32. [Dwarf](https://github.com/iGio90/Dwarf) - GUI for reverse engineering
|
||||||
33. [Andromeda](https://github.com/secrary/Andromeda) - Another basic command-line reverse engineering tool
|
33. [Andromeda](https://github.com/secrary/Andromeda) - Another basic command-line reverse engineering tool
|
||||||
|
34. ~~[Smali viewer](http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip)~~
|
||||||
|
35. ~~[ZjDroid](https://github.com/BaiduSecurityLabs/ZjDroid)~~, ~~[fork/mirror](https://github.com/yangbean9/ZjDroid)~~
|
||||||
|
36. ~~[Dare](http://siis.cse.psu.edu/dare/index.html) – .dex to .class converter~~
|
||||||
|
|
||||||
### Fuzz Testing
|
### Fuzz Testing
|
||||||
|
|
||||||
|
@ -13,7 +13,8 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/',
|
|||||||
'habo.qq.com','www.fasteque.com','http://admire.necst.it/','tracedroid.few.vu.nl',\
|
'habo.qq.com','www.fasteque.com','http://admire.necst.it/','tracedroid.few.vu.nl',\
|
||||||
'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com',\
|
'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com',\
|
||||||
'https://redmine.honeynet.org/projects/are/wiki','https://www.visualthreat.com/',\
|
'https://redmine.honeynet.org/projects/are/wiki','https://www.visualthreat.com/',\
|
||||||
'http://www.mobilemalware.com.br','https://appscan.bluemix.net'
|
'http://www.mobilemalware.com.br','https://appscan.bluemix.net',\
|
||||||
|
'http://siis.cse.psu.edu/tools.html','http://siis.cse.psu.edu/dare/index.html'
|
||||||
|
|
||||||
FLAKY_URLS='http://safe.ijiami.cn/'
|
FLAKY_URLS='http://safe.ijiami.cn/'
|
||||||
SRC_FILE=README.md
|
SRC_FILE=README.md
|
||||||
|
Loading…
Reference in New Issue
Block a user