A collection of android security related resources
Go to file
2016-11-20 23:56:28 +08:00
.travis.yml Whitelist urls for Travis 2016-08-13 13:16:53 -07:00
contributing.md Added contributing.md 2015-07-19 00:00:27 -04:00
LICENSE Initial commit 2014-07-22 15:30:51 -04:00
README.md Move devknox to app vulnerability scanner rather than a static analysis tool 2016-11-20 23:56:28 +08:00

android-security-awesome Awesome

A collection of android security related resources.

A lot of work is happening in academia and industry on tools to perform dynamic analysis, static analysis and reverse engineering of android apps.

ONLINE ANALYZERS

  1. AndroTotal

STATIC ANALYSIS TOOLS

  1. Androwarn - detect and warn the user about potential malicious behaviours developped by an Android application.

APP VULNERABILITY SCANNERS

  1. Devknox - Autocorrect security issues as if it was spell check from your IDE
  2. QARK - QARK by LinkedIn is for app developers to scan app for security issues
  3. AndroBugs
  4. Nogotofail

DYNAMIC ANALYSIS TOOLS

  1. Android DBI frameowork
  2. Androl4b- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
  • Android Malware Analysis Toolkit - (linux distro) Earlier it use to be an online analyzer
  • Mobile-Security-Framework MobSF - Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.
  • AppUse custom build for pentesting
  • Cobradroid custom image for malware analysis
  • ViaLab Community Edition
  • Droidbox
  • Mercury
  • Drozer
  • Xposed - equivalent of doing Stub based code injection but without any modifications to the binary
  • Android Hooker - Dynamic Java code instrumentation (requires the Substrate Framework)
  • ProbeDroid - Dynamic Java code instrumentation
  • Android Tamer - Virtual / Live Platform for Android Security Professionals
  • DECAF - Dynamic Executable Code Analysis Framework based on QEMU (DroidScope is now an extension to DECAF)
  • CuckooDroid - Android extension for Cuckoo sandbox
  • Mem - Memory analysis of Android (root required)
  • Crowdroid unable to find the actual tool
  • AuditdAndroid android port of auditd, not under active development anymore
  • Android Security Evaluation Framework - not under active development anymore
  • Android Reverse Engineering ARE (android reverse engineering) not under active development anymore
  • Aurasium Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.
  • Android Linux Kernel modules
  • Appie - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment.It is completely portable and can be carried on USB stick or smartphone.This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
  • StaDynA - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information.
  • DroidAnalytics - incomplete
  • Vezir Project - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
  • MARA - Mobile Application Reverse engineering and Analysis Framework
  • NowSecure Lab Automated - Enterprise tool for mobile app security testing both Android and iOS mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes.
  • Taintdroid - requires AOSP compilation

REVERSE ENGINEERING

  1. Smali/Baksmali apk decompilation

FUZZ TESTING

  1. IntentFuzzer

APP REPACKAGING DETECTORS

  1. FSquaDRA - a tool for detection of repackaged Android applications based on app resources hash comparison.

EXPLOITABLE VULNERABILITIES

  1. Vulnerability Google Doc

SAMPLE SOURCES

  1. Contagio Mini Dump
  2. Android Malware Github repo

READING MATERIAL

  1. Android Security (and Not) Internals

MARKET CRAWLERS

  1. Google play crawler (Java)

MISC TOOLS

  1. smalihook

TUTORIALS

  1. Android Reverse Engineering 101 by Daniele Altomare

Other Awesome Lists

Other amazingly awesome lists can be found in the awesome-awesomeness list.

Contributing

Your contributions are always welcome!