Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
android-security-awesome
A collection of android security related resources
https://github.com/ashishb/android-security-awesome
Last synced: 3 days ago
JSON representation
-
Tools
-
Online Analyzers
- Stowaway
- Anubis
- Fireeye - max 60MB 15/day~~
- Mobile app insight
- AndroTotal
- Appknox - not free
- Virustotal - max 128MB
- Fraunhofer App-ray - not free
- NowSecure Lab Automated - Enterprise tool for mobile app security testing both Android and iOS mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes. Not free
- App Detonator - Detonate APK binary to provide source code level details including app author, signature, build, and manifest information. 3 Analysis/day free quota.
- Approver - Approver is a fully automated security analysis and risk assessment platform for Android and iOS apps. Not free.
- Oversecured - Enterprise vulnerability scanner for Android and iOS apps, it offers app owners and developers the ability to secure each new version of a mobile app by integrating Oversecured into the development process. Not free.
- AppSweep by Guardsquare - Free, fast Android application security testing for developers
- Koodous - Performs static/dynamic malware analysis over a vast repository of Android samples and checks them against public and private Yara rules.
- BitBaan
- AVC UnDroid
- AMAaaS - Free Android Malware Analysis Service. A bare-metal service features static and dynamic analysis for Android applications. A product of [MalwarePot](https://malwarepot.com/index.php/AMAaaS)~~.
- AppCritique - Upload your Android APKs and receive comprehensive free security assessments~~
- NVISO ApkScan - sunsetting on Oct 31, 2019~~
- Mobile Malware Sandbox
- IBM Security AppScan Mobile Analyzer - not free~~
- Visual Threat - no longer an Android app analyzer~~
- Tracedroid
- habo - 10/day~~
- CopperDroid
- SandDroid
- Mobile-Sandbox
- Ijiami
- Comdroid
- Android Sandbox
- Foresafe
- Dexter
- MobiSec Eacus
- Android Sandbox
- MobiSec Eacus
- Virustotal - max 128MB
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- MobiSec Eacus
- Mobile-Sandbox
- Android Sandbox
- Android Sandbox
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- Android Sandbox
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- MobiSec Eacus
- approver - Approver is a fully automated security analysis and risk assessment platform for Android and iOS apps. Not free.~~
- Immuniweb
- Android Sandbox
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- Foresafe
- Comdroid
- Android Sandbox
- Android Sandbox
- Android Sandbox
- Android Sandbox
- AMAaaS - Free Android Malware Analysis Service. A bare-metal service features static and dynamic analysis for Android applications. A product of [MalwarePot](https://malwarepot.com/index.php/AMAaaS)~~.
- Android Sandbox
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- Android Sandbox
- Android Sandbox
- Android Sandbox
- Android Sandbox
- Android Sandbox
- Android Sandbox
- Android Sandbox
- Pithus - Open-Source APK analyzer. Still in Beta for the moment and limited to static analysis for the moment. It is possible to hunt malware with Yara rules. More [here](https://beta.pithus.org/about/).
- Android Sandbox
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- Android Sandbox
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- Android Sandbox
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- MobiSec Eacus
- Android Sandbox
- Android Sandbox
- Android Sandbox
- Android Sandbox
- Android Sandbox
-
Static Analysis Tools
- Droid Intent Data Flow Analysis for Information Leakage
- DroidLegacy
- Smali CFG generator
- FlowDroid
- Android Decompiler
- PSCout - A tool that extracts the permission specification from the Android OS source code using static analysis
- Amandroid
- SPARTA - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](https://types.cs.washington.edu/checker-framework/)
- Several tools from PSU
- ApkAnalyser
- Amandroid
- SmaliSCA - Smali Static Code Analysis
- Madrolyzer - extracts actionable data like C&C, phone number etc.
- ConDroid - Performs a combination of symbolic + concrete execution of the app
- DroidRA
- RiskInDroid - A tool for calculating the risk of Android apps based on their permissions, with an online demo available.
- SUPER - Secure, Unified, Powerful and Extensible Rust Android Analyzer
- ClassyShark - Standalone binary inspection tool which can browse any Android executable and show important info.
- StaCoAn - Cross-platform tool which aids developers, bug-bounty hunters, and ethical hackers in performing static code analysis on mobile applications. This tool was created with a big focus on usability and graphical guidance in the user interface.
- JAADAS - Joint intraprocedural and interprocedural program analysis tool to find vulnerabilities in Android apps, built on Soot and Scala
- Quark-Engine - An Obfuscation-Neglect Android Malware Scoring System
- One Step Decompiler - Android APK Decompilation for the Lazy
- APKLeaks - Scanning APK file for URIs, endpoints & secrets.
- Mobile Audit - Web application for performing Static Analysis and detecting malware in Android APKs.
-
App Vulnerability Scanners
- Devknox - IDE plugin to build secure Android apps. Not maintained anymore.~~
- AndroBugs
- Nogotofail
-
Dynamic Analysis Tools
- Android DBI frameowork
- Androl4b - A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
- AppUse
- Drozer
- Xposed - equivalent of doing Stub-based code injection but without any modifications to the binary
- Android Tamer - Virtual / Live Platform for Android Security Professionals~~
- Crowdroid
- Android Security Evaluation Framework - not under active development anymore
- Appie - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on a USB stick or smartphone. This is a one-stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
- Taintdroid - requires AOSP compilation
- ARTist - a flexible open-source instrumentation and hybrid analysis framework for Android apps and Android's Java middleware. It is based on the Android Runtime's (ART) compiler and modifies code during on-device compilation.
- Android Malware Analysis Toolkit - (Linux distro) Earlier it use to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.php)~~
- Android Reverse Engineering
- ViaLab Community Edition
- Mercury
- Cobradroid
- House - House: A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
- Mobile-Security-Framework MobSF - Mobile Security Framework is an intelligent, all-in-one open-source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.
- Droidbox
- Drozer
- Inspeckage - Android Package Inspector - dynamic analysis with API hooks, start unexported activities, and more. (Xposed Module)
- Android Hooker - Dynamic Java code instrumentation (requires the Substrate Framework)
- ProbeDroid - Dynamic Java code instrumentation
- CuckooDroid - Android extension for Cuckoo sandbox
- Mem - Memory analysis of Android (root required)
- Decompiler.com - Online APK and Java decompiler
-
Reverse Engineering
- vim syntax coloring for smali files
- Apktool
- Dedexer
- Frida - inject javascript to explore applications and a [GUI tool](https://github.com/antojoseph/diff-gui) for it
- Indroid
- IntentSniffer
- CFR - Java decompiler
- Radare2
- MVT (Mobile Verification Toolkit) - a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices
- Procyon - Java decompiler~~
- Smali viewer
- ZjDroid
- Dare
- Jad - Java decompiler
-
Fuzz Testing
-
Misc Tools
- smalihook
- AXMLPrinter2 - to convert binary XML files to human-readable XML files
- Android Device Security Database - Database of security features of Android devices~~
- Opcodes table for quick reference
- APK-Downloader - seems dead now
- Dalvik opcodes
-
Vulnerable Applications for practice
-
Market Crawlers
- APK Downloader
- Apkpure - Online apk downloader. Provides also its own app for downloading.~~
- APK Downloader
-
-
Academic/Research/Publications/Books
-
Research Papers
-
Books
-
Others
- OWASP Mobile Security Testing Guide Manual
- android app security checklist
- Android Reverse Engineering 101 by Daniele Altomare (Web Archive link)
- Mobile Security Reading Room - A reading room that contains well-categorized technical reading material about mobile penetration testing, mobile malware, mobile forensics, and all kind of mobile security-related topics~~
- Mobile Security Reading Room - A reading room that contains well-categorized technical reading material about mobile penetration testing, mobile malware, mobile forensics, and all kind of mobile security-related topics~~
- Android Reverse Engineering 101 by Daniele Altomare (Web Archive link)
-
-
Exploits/Vulnerabilities/Bugs
-
List
- Android Security Bulletins
- Android's reported security vulnerabilities
- AOSP - Issue tracker
- OWASP Mobile Top 10 2016
- Exploit Database - click search
- Vulnerability Google Doc
- Google Android Security Team’s Classifications for Potentially Harmful Applications (Malware)
- Android Devices Security Patch Status
-
Malware
- androguard - Database Android Malware wiki
- Android Malware Genome Project - contains 1260 malware samples categorized into 49 different malware families, free for research purposes.
- Contagio Mobile Malware Mini Dump
- Drebin
- Kharon Malware Dataset - 7 malware which have been reverse-engineered and documented
- Android Adware and General Malware Dataset
- AndroZoo - AndroZoo is a growing collection of Android Applications collected from several sources, including the official Google Play app market.
- Android PRAGuard Dataset - The dataset contains 10479 samples, obtained by obfuscating the MalGenome and the Contagio Minidump datasets with seven different obfuscation techniques.~~
- Admire
-
How to report Security issues
-
Sub Categories
Keywords
android
9
apk
5
mobile-security
5
reverse-engineering
4
security
3
android-security
3
malware-analysis
3
static-analysis
3
mobile
2
security-tools
2
bugbounty
2
vulnerability
2
java
2
dynamic-analysis
2
apk-parser
2
windows
1
analysis
1
vulnerabilities
1
classyshark
1
dex
1
jar
1
kotlin
1
multidex
1
static-code-analysis
1
android-applications
1
inter-procedure-analysis
1
soot
1
ai
1
application-security
1
malware-analyzer
1
penetration-testing
1
python
1
smali
1
android-permissions
1
machine-learning
1
quantitative-risk-analysis
1
risk
1
riskindroid
1
analyzer
1
android-analyzer
1
android-development
1
linux
1
macos
1
rust
1
security-audit
1
security-automation
1
security-scanner
1
super
1
cwe
1
devsecops
1