0% found this document useful (0 votes)
7 views9 pages

NOTE20240303223511

The document is a comprehensive collection of Android security resources, including online analyzers, static and dynamic analysis tools, and reverse engineering tools. It lists various tools for vulnerability scanning, malware analysis, and app security testing, highlighting their features and whether they are free or not. Additionally, it covers tools for fuzz testing and app repackaging detection, providing a valuable resource for Android security professionals.

Uploaded by

Sanoop S Nair
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views9 pages

NOTE20240303223511

The document is a comprehensive collection of Android security resources, including online analyzers, static and dynamic analysis tools, and reverse engineering tools. It lists various tools for vulnerability scanning, malware analysis, and app security testing, highlighting their features and whether they are free or not. Additionally, it covers tools for fuzz testing and app repackaging detection, providing a valuable resource for Android security professionals.

Uploaded by

Sanoop S Nair
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Android Security Awesome A collection of android security related


resources.

Online Analyzers

AndroTotal

Appknox – not free

AVC UnDroid

Virustotal – max 128MB

Fraunhofer App-ray – not free

NowSecure Lab Automated – Enterprise tool for mobile app


security testing both Android and iOS mobile apps. Lab
Automated features dynamic and static analysis on real devices in
the cloud to return results in minutes. Not free

App Detonator – Detonate APK binary to provide source code level


details including app author, signature, build and manifest
information. 3 Analysis/day free quota.

BitBaan

Pithus – Open-Source APK analyzer. Still in Beta for the moment


and limited to static analysis for the moment. Possible to hunt
malwares with Yara rules. More here.

Approver – Approver is a fully automated security analysis and


risk assessment platform for Android and iOS apps. Not free.
Oversecured – Enterprise vulnerability scanner for Android and
iOS apps, it offers app owners and developers the ability to secure
each new version of a mobile app by integrating Oversecured into
the development process. Not free.

Static Analysis Tools

Androwarn – detect and warn the user about potential malicious


behaviours developed by an Android application.

ApkAnalyser

APKInspector

Droid Intent Data Flow Analysis for Information Leakage

DroidLegacy

Smali CFG generator

FlowDroid

Android Decompiler – not free

PSCout – A tool that extracts the permission specification from


the Android OS source code using static analysis

Amandroid

SmaliSCA – Smali Static Code Analysis

CFGScanDroid – Scans and compares CFG against CFG of


malicious applications

Madrolyzer – extracts actionable data like C&C, phone number


etc.

SPARTA – verifies (proves) that an app satisfies an information-


flow security policy; built on the Checker Framework
ConDroid – Performs a combination of symbolic + concrete
execution of the app

DroidRA

RiskInDroid – A tool for calculating the risk of Android apps based


on their permissions, with online demo available.

SUPER – Secure, Unified, Powerful and Extensible Rust Android


Analyzer

ClassyShark – Standalone binary inspection tool which can browse


any Android executable and show important infos.

StaCoAn – Crossplatform tool which aids developers, bugbounty


hunters and ethical hackers performing static code analysis on
mobile applications. This tool was created with a big focus on
usability and graphical guidance in the user interface.

JAADAS – Joint intraprocedure and interprocedure program


analysis tool to find vulnerabilities in Android apps, built on Soot
and Scala

Quark-Engine – An Obfuscation-Neglect Android Malware Scoring


System

One Step Decompiler – Android APK Decompilation for the Lazy

APKLeaks – Scanning APK file for URIs, endpoints & secrets.

Mobile Audit – Web application for performing Static Analysis and


detecting malware in Android APKs.

App Vulnerability Scanners

QARK – QARK by LinkedIn is for app developers to scan app for


security issues
AndroBugs

Nogotofail

Dynamic Analysis Tools

Android DBI frameowork

Androl4b– A Virtual Machine For Assessing Android applications,


Reverse Engineering and Malware Analysis

House– House: A runtime mobile application analysis toolkit with a


Web GUI, powered by Frida, written in Python.

Mobile-Security-Framework MobSF – Mobile Security Framework is


an intelligent, all-in-one open source mobile application
(Android/iOS) automated pen-testing framework capable of
performing static, dynamic analysis and web API testing.

AppUse – custom build for pentesting

Droidbox

Drozer

Xposed – equivalent of doing Stub based code injection but


without any modifications to the binary

Inspeckage – Android Package Inspector – dynamic analysis with


api hooks, start unexported activities and more. (Xposed Module)

Android Hooker – Dynamic Java code instrumentation (requires


the Substrate Framework)

ProbeDroid – Dynamic Java code instrumentation

Android Tamer – Virtual / Live Platform for Android Security


Professionals
DECAF – Dynamic Executable Code Analysis Framework based on
QEMU (DroidScope is now an extension to DECAF)

CuckooDroid – Android extension for Cuckoo sandbox

Mem – Memory analysis of Android (root required)

Crowdroid – unable to find the actual tool

AuditdAndroid – android port of auditd, not under active


development anymore

Android Security Evaluation Framework – not under active


development anymore

Aurasium – Practical security policy enforcement for Android apps


via bytecode rewriting and in-place reference monitor.

Android Linux Kernel modules

Appie – Appie is a software package that has been pre-configured


to function as an Android Pentesting Environment. It is completely
portable and can be carried on USB stick or smartphone. This is a
one stop answer for all the tools needed in Android Application
Security Assessment and an awesome alternative to existing
virtual machines.

StaDynA – a system supporting security app analysis in the


presence of dynamic code update features (dynamic class loading
and reflection). This tool combines static and dynamic analysis of
Android applications in order to reveal the hidden/updated
behavior and extend static analysis results with this information.

DroidAnalytics – incomplete

Vezir Project – Virtual Machine for Mobile


Application Pentesting and Mobile Malware Analysis

MARA – Mobile Application Reverse engineering and Analysis


Framework

Taintdroid – requires AOSP compilation

ARTist – a flexible open source instrumentation and hybrid


analysis framework for Android apps and Android’s java
middleware. It is based on the Android Runtime’s (ART) compiler
and modifies code during on-device compilation.

Android Malware Sandbox

AndroPyTool – a tool for extracting static and dynamic features


from Android APKs. It combines different well-known Android apps
analysis tools such as DroidBox, FlowDroid, Strace, AndroGuard or
VirusTotal analysis.

Runtime Mobile Security (RMS) – is a powerful web interface that


helps you to manipulate Android and iOS Apps at Runtime

PAPIMonitor – PAPIMonitor (Python API Monitor for Android apps) is


a python tool based on Frida for monitoring user-select APIs
during the app execution.

Android_application_analyzer – The tool is used to analyze the


content of the android application in local storage.

Reverse Engineering

Smali/Baksmali – apk decompilation

emacs syntax coloring for smali files

vim syntax coloring for smali files

AndBug

Androguard – powerful, integrates well with other tools

Apktool – really useful for compilation/decompilation (uses smali)


Android Framework for Exploitation

Bypass signature and permission checks for IPCs

Android OpenDebug – make any application on device debuggable


(using cydia substrate).

Dex2Jar – dex to jar converter

Enjarify – dex to jar converter from Google

Dedexer

Fino

Frida – inject javascript to explore applications and a GUI tool for it

Indroid – thread injection kit

IntentSniffer

Introspy

Jad – Java decompiler

JD-GUI – Java decompiler

CFR – Java decompiler

Krakatau – Java decompiler

FernFlower – Java decompiler

Redexer – apk manipulation

Simplify Android deobfuscator

Bytecode viewer
Radare2

Jadx

Dwarf – GUI for reverse engineering

Andromeda – Another basic command-line reverse engineering


tool

apk-mitm – A CLI application that prepares Android APK files for


HTTPS inspection

Noia – Simple Android application sandbox file browser tool

Obfuscapk – Obfuscapk is a modular Python tool for obfuscating


Android apps without needing their source code.

ARMANDroid – ARMAND (Anti-Repackaging through Multi-


patternAnti-tampering based on Native Detection) is a novel anti-
tampering protection scheme that embeds logic bombs and AT
detection nodes directly in the apk file without needing their
source code.

MVT (Mobile Verification Toolkit) – a collection of utilities to


simplify and automate the process of gathering forensic traces
helpful to identify a potential compromise of Android and iOS
devices

Decompiler.com – Online APK and Java decompiler

Fuzz Testing

IntentFuzzer

Radamsa Fuzzer

Honggfuzz
An Android port of the melkor ELF fuzzer

Media Fuzzing Framework for Android

AndroFuzz

App Repackaging Detectors

FSquaDRA – a tool for detection of repackaged Android


applications based on app resources hash comparison.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy