From eec027483a6ffd855ed07dd9c0f50117c46bb6ca Mon Sep 17 00:00:00 2001 From: Alexander Fink Date: Fri, 25 Oct 2019 02:39:41 +0200 Subject: [PATCH] Added ARTist --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index a32acbc..db45c19 100644 --- a/README.md +++ b/README.md @@ -98,6 +98,7 @@ A collection of android security related resources. 28. [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis 29. [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework 30. [Taintdroid](http://appanalysis.org) - requires AOSP compilation +31. [ARTist](https://artist.cispa.saarland) - a flexible open source instrumentation and hybrid analysis framework for Android apps and Android's java middleware. It is based on the Android Runtime's (ART) compiler and modifies code during on-device compilation. 3. ~~[Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (linux distro) Earlier it use to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.php)~~ 31. ~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore~~ 31. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~