A collection of android security related resources
Go to file
2015-12-28 11:50:14 +08:00
.travis.yml Added .travis.yml 2015-12-21 01:11:26 -08:00
contributing.md Added contributing.md 2015-07-19 00:00:27 -04:00
LICENSE Initial commit 2014-07-22 15:30:51 -04:00
README.md Merge remote-tracking branch 'ashishb/master' 2015-12-28 11:50:14 +08:00

android-security-awesome Awesome

A collection of android security related resources.

A lot of work is happening in academia and industry on tools to perform dynamic analysis, static analysis and reverse engineering of android apps.

ONLINE ANALYZERS

  1. AndroTotal <<<<<<< HEAD

STATIC ANALYSIS TOOLS

  1. Androwarn - detect and warn the user about potential malicious behaviours developped by an Android application.
  1. Anubis
  2. App 360 scan
  3. CopperDroid
  4. Dexter
  5. Foresafe
  6. Mobile app insight
  7. Mobile-Sandbox
  8. Sandroid
  9. Tracedroid
  10. Visual Threat
  11. Android Sandbox
  12. Mobile Malware Sandbox
  13. MobiSec Eacus
  14. IBM Security AppScan Mobile Analyzer - not free
  15. NVISO ApkScan
  16. AVC UnDroid
  17. Stowaway seems to be dead now
  18. Comdroid - seems to be dead now

STATIC ANALYSIS TOOLS

  1. Androwarn
  2. ApkAnalyser
  3. APKInspector
  4. Droid Intent Data Flow Analysis for Information Leakage
  5. Several tools from PSU
  6. Smali CFG generator
  7. FlowDroid
  8. Android Decompiler not free
  9. PSCout - A tool that extracts the permission specification from the Android OS source code using static analysis
  10. Amandroid
  11. SmaliSCA - Smali Static Code Analysis
  12. CFGScanDroid - Scans and compares CFG against CFG of malicious applications
  13. Madrolyzer - extracts actionable data like C&C, phone number etc.
  14. SPARTA - verifies (proves) that an app satisfies an information-flow security policy; built on the Checker Framework

APP VULNERABILITY SCANNERS

  1. QARK - QARK by LinkedIn is for app developers to scan app for security issues
  2. AndroBugs

ashishb/master

DYNAMIC ANALYSIS TOOLS

  1. Android DBI frameowork <<<<<<< HEAD
  • Android Malware Analysis Toolkit - (linux distro) Earlier it use to be an online analyzer
  • AppUse custom build for pentesting
  • Cobradroid custom image for malware analysis
  • ViaLab Community Edition
  • Droidbox
  • Mercury
  • Drozer
  • Taintdroid - requires AOSP compilation
  • Xposed - equivalent of doing Stub based code injection but without any modifications to the binary
  • Android Hooker - API Hooking of java methods triggered by any Android application (requires the Substrate Framework)
  • Android tamer - custom image
  • Droidscope - custom image for dynamic analysis
  • CuckooDroid - Android extension for Cuckoo sandbox
  • Mem - Memory analysis of Android (root required)
  • Crowdroid unable to find the actual tool
  • AuditdAndroid android port of auditd, not under active development anymore
  • Android Security Evaluation Framework - not under active development anymore
  • Android Reverse Engineering ARE (android reverse engineering) not under active development anymore
  • Aurasium Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.
  • Android Linux Kernel modules
  • Appie - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment.It is completely portable and can be carried on USB stick or smartphone.This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
  • StaDynA - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information.
  • DroidAnalytics - incomplete =======
  1. Android Malware Analysis Toolkit - (linux distro) Earlier it use to be an online analyzer
  2. AppUse custom build for pentesting
  3. Cobradroid custom image for malware analysis
  4. ViaLab Community Edition
  5. Droidbox
  6. Mercury
  7. Drozer
  8. Taintdroid - requires AOSP compilation
  9. Xposed - equivalent of doing Stub based code injection but without any modifications to the binary
  10. Android Hooker - API Hooking of java methods triggered by any Android application (requires the Substrate Framework)
  11. Android tamer - custom image
  12. Droidscope - custom image for dynamic analysis
  13. CuckooDroid - Android extension for Cuckoo sandbox
  14. Mem - Memory analysis of Android (root required)
  15. Crowdroid unable to find the actual tool
  16. AuditdAndroid android port of auditd, not under active development anymore
  17. Android Security Evaluation Framework - not under active development anymore
  18. Android Reverse Engineering ARE (android reverse engineering) not under active development anymore
  19. Ijiami (Chinese) - seems dead now
  20. Aurasium rewrites the android app to add security policy, seems dead now
  21. Android Linux Kernel modules
  22. Appie - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment.It is completely portable and can be carried on USB stick or smartphone.This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
  23. StaDynA - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information.
  24. DroidAnalytics - incomplete
  25. Vezir Project - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis

ashishb/master

REVERSE ENGINEERING

  1. Smali/Baksmali apk decompilation <<<<<<< HEAD

FUZZ TESTING

  1. IntentFuzzer
  1. emacs syntax coloring for smali files
  2. vim syntax coloring for smali files
  3. AndBug
  4. Androguard powerful, integrates well with other tools
  5. Apktool really useful for compilation/decompilation (uses smali)
  6. Android Framework for Exploitation
  7. Bypass signature and permission checks for IPCs
  8. Android OpenDebug make any application on device debuggable (using cydia substrate).
  9. Dare .dex to .class converter
  10. Dex2Jar - dex to jar converter
  11. Enjarify - dex to jar converter from Google
  12. Dedexer
  13. Fino
  14. Indroid thread injection kit
  15. IntentSniffer
  16. Introspy
  17. Jad - Java decompiler
  18. JD-GUI - Java decompiler
  19. CFR - Java decompiler
  20. Krakatau - Java decompiler
  21. Procyon - Java decompiler
  22. FernFlower - Java decompiler
  23. Redexer apk manipulation
  24. Smali viewer
  25. ZjDroid (no longer available), fork/mirror
  26. Simplify Android deobfuscator
  27. Bytecode viewer
  28. Krakatau

FUZZ TESTING

  1. IntentFuzzer
  2. Radamsa Fuzzer
  3. Honggfuzz
  4. An Android port of the melkor ELF fuzzer
  5. Media Fuzzing Framework for Android

ashishb/master

##APP REPACKAGING DETECTORS

  1. FSquaDRA - a tool for detection of repackaged Android applications based on app resources hash comparison.

Exploitable Vulnerabilties

  1. Vulnerability Google doc

SAMPLE SOURCES

  1. contagio mini dump <<<<<<< HEAD

Reading material

  1. Android Security (and Not) Internals
  1. Open Source database
  2. Drebin
  3. Admire
  4. MalGenome - contains 1260 malware samples categorized into 49 different malware families, free for research purpose.
  5. VirusTotal Malware Intelligence Service - powered by VirusTotal,not free

Reading material

  1. Android Security (and Not) Internals
  2. Android security related presentations
  3. A good collection of static analysis papers

ashishb/master

MARKET CRAWLERS

  1. Google play crawler (Java)

MISC TOOLS

  1. smalihook <<<<<<< HEAD
  1. APK-Downloader
  2. AXMLPrinter2 - to convert binary XML files to human-readable XML files
  3. adb autocomplete
  4. Dalvik opcodes
  5. Opcodes table for quick reference
  6. ExploitMe - for practice
  7. GoatDroid - for practice
  8. Android Labs - for practice
  9. mitmproxy
  10. dockerfile/androguard
  11. Android Vulnerability Test Suite - android-vts scans a device for set of vulnerabilities

ashishb/master

Other Awesome Lists

Other amazingly awesome lists can be found in the awesome-awesomeness list.

Contributing

Your contributions are always welcome!