From f6e9e25232e1140be8aef7d8431b05faa283d7e9 Mon Sep 17 00:00:00 2001 From: Vaibhav <35214224+vaib25vicky@users.noreply.github.com> Date: Fri, 3 Jan 2020 01:25:26 +0530 Subject: [PATCH] Update README.md --- README.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 3e61ae3..2b4d4f4 100644 --- a/README.md +++ b/README.md @@ -21,7 +21,7 @@ * [Pentesting Android Apps Using Frida](https://www.notsosecure.com/pentesting-android-apps-using-frida/) * [Mobile Security Testing Guide](https://mobile-security.gitbook.io/mobile-security-testing-guide/) * [Mobile Application Penetration Testing Cheat Sheet](https://github.com/sh4hin/MobileApp-Pentest-Cheatsheet) - * [ANDROID APPLICATIONS REVERSING 101](https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/#.WQND0G3TTOM.reddit) + * [Android Applications Reversing 101](https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/#.WQND0G3TTOM.reddit) * [Android Security Guidelines](https://developer.box.com/en/guides/security/) * [Amandroid – A Static Analysis FrameworkA](http://pag.arguslab.org/argus-saf/) * [Androwarn – Yet Another Static Code Analyzer](https://github.com/maaaaz/androwarn/) @@ -79,7 +79,6 @@ * [Marvin - Analyzes Android applications and allows tracking of an app](https://github.com/programa-stic/marvin-django) * [Inspeckage](https://github.com/ac-pm/Inspeckage) * [PATDroid - Collection of tools and data structures for analyzing Android applications](https://github.com/mingyuan-xia/PATDroid) - * [] * [AndroL4b - Android security virtual machine based on ubuntu-mate](https://github.com/sh4hin/Androl4b) * [Radare2 - Unix-like reverse engineering framework and commandline tools](https://github.com/radareorg/radare2) * [ByteCodeViewer - Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger)](https://bytecodeviewer.com/) @@ -103,7 +102,7 @@ * [App Critique](https://appcritique.boozallen.com/) * [Labs](#labs) - * []() + * [Misc.](#Misc.)