Tracking how apps use sensitive information required Traceview: Free automated vulnerability test. A wrapper to get dex from oat SmaliSCA: Collection of extended examples for Android developers Androwarn: Cross-platform open-source tool suite used to flash firmware aka ROMs onto Samsung mobile devices Hidex: Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.
|Date Added:||17 March 2014|
|File Size:||54.96 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
Shrinks, optimizes, and obfuscates the code by removing unused code and renaming classes, fields, and methods with semantically obscure names Reverse Engineering AndBug: Collection of extended examples for Android developers Androwarn: Memory analysis of Android root required Crowdroid: Lab Automated apm dynamic and static analysis on real devices in the cloud to return results in minutes.
Appie is a software package that has been pre-configured to function as an Android Pentesting Environment.
Is a context- flow- field- object-sensitive and lifecycle-aware static taint analysis tool for Android applications Heimdall: An Android port of radamsa fuzzer Honggfuzz: Free automated vulnerability test.
Tracking how apps use sensitive information required Traceview: Static Code Analysis for Smali files Soot: Analyzing the Android Permission Specification Scalpel: Android extension for Cuckoo taijtdroid Mem: SandDroid informe de ejemplo: Graphical viewer for execution logs saved by your application Undx: Adds some instructions to the classes.
This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines. Android forensics tool developed by viaForensics Amandroid: Decompiler for arbitrary Java bytecode DecoJer: Cross-platform open-source tool suite used to flash firmware aka ROMs onto Samsung mobile devices Hidex: Blackbox tool to help understand what an Android application is doing at runtime and assist in the identification of potential security issues JAD: Static android application analysis tool Dexterity: Android small footprint inspection tool Frida: Java Decompiler Gui for Procyon Procyon: Java decompiler Redexer — apk manipulation Smali viewer Simplify Android deobfuscator: The FindBugs plugin for security audits of Java web applications.
No need to install on Windows.
A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process An Android port of the melkor ELF fuzzer IntentFuzzer: Demo application where a method named thisishidden in class MrHyde is hidden from disassemblers but no called by the app Hooker: Analyze the performance capturing and displaying execution times of your applications and other Android system processes TaintDroid: Is a static analysis framework for Android apps Android backup extractor: Optimizer and obfuscator for Android HoseDex2Jar: Quick Android Review Kit – This tool is designed to look for several security related Android application vulnerabilities, either in source code or packaged APKs.
Unix-like reverse engineering framework and commandline tools Reverse Android: Is building a toolset to verify the security of mobile phone applications Apk Sign: Graphical user interface for several Android application debugging and analysis tools Dexinfo: Java Decompiler apk, dex, jar and java class-files Androguard: