From ec1d907e42033957cd8e2a796338dfea18b60d81 Mon Sep 17 00:00:00 2001 From: Ashish Bhatia Date: Wed, 28 Jul 2021 20:51:26 -0700 Subject: [PATCH] Add MVT (#147) --- README.md | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 9505fb9..36aa133 100644 --- a/README.md +++ b/README.md @@ -153,10 +153,11 @@ A collection of android security related resources. 35. [Noia](https://github.com/0x742/noia) - Simple Android application sandbox file browser tool 36. [Obfuscapk](https://github.com/ClaudiuGeorgiu/Obfuscapk) - Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code. 37. [ARMANDroid](https://github.com/Mobile-IoT-Security-Lab/ARMANDroid) - ARMAND (Anti-Repackaging through Multi-patternAnti-tampering based on Native Detection) is a novel anti-tampering protection scheme that embeds logic bombs and AT detection nodes directly in the apk file without needing their source code. -36. ~~[Procyon](https://bitbucket.org/mstrobel/procyon/wiki/Java%20Decompiler) - Java decompiler~~ -34. ~~[Smali viewer](http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip)~~ -35. ~~[ZjDroid](https://github.com/BaiduSecurityLabs/ZjDroid)~~, ~~[fork/mirror](https://github.com/yangbean9/ZjDroid)~~ -36. ~~[Dare](http://siis.cse.psu.edu/dare/index.html) – .dex to .class converter~~ +38. [MVT (Mobile Verification Toolkit)](https://github.com/mvt-project/mvt) - a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices +39. ~~[Procyon](https://bitbucket.org/mstrobel/procyon/wiki/Java%20Decompiler) - Java decompiler~~ +40. ~~[Smali viewer](http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip)~~ +41. ~~[ZjDroid](https://github.com/BaiduSecurityLabs/ZjDroid)~~, ~~[fork/mirror](https://github.com/yangbean9/ZjDroid)~~ +42. ~~[Dare](http://siis.cse.psu.edu/dare/index.html) – .dex to .class converter~~ ### Fuzz Testing