An open API service indexing awesome lists of open source software.

Awesome-Android-Reverse-Engineering

A curated list of awesome Android Reverse Engineering training, resources, and tools.
https://github.com/user1342/Awesome-Android-Reverse-Engineering

Last synced: 1 day ago
JSON representation

  • Resources

  • Tools

    • Dynamic Analysis Tools

      • Wireshark - Open-source network protocol analyzer.
      • ☆ Frida - Dynamic instrumentation toolkit for runtime manipulation.
      • ☆ Burp Suite - Commercial tool for analyzing network traffic of Android apps.
      • Drozer - An open-source framework for Android security testing that provides a comprehensive set of tools for dynamic analysis, including intercepting, modifying, and analysing app traffic.
      • jtrace - strace for Android - for tracing system-level calls including Binder.
      • sesearch - Command line tool for querying SELinux policies.
      • ☆ Burp Suite - A popular commercial web security testing tool that can be used for analysing network traffic of Android apps for potential security vulnerabilities.
      • Wireshark - A widely used open-source network protocol analyzer that can capture, analyse, and dissect network traffic generated by Android apps for security analysis.
      • SSLsplit - An open-source tool for intercepting and manipulating SSL/TLS encrypted traffic, which can be used for analysing SSL/TLS communication in Android apps.
      • MITMProxy - An open-source man-in-the-middle proxy that allows for intercepting and analysing network traffic generated by Android apps for security testing and analysis.
      • ☆ Frida - A dynamic instrumentation toolkit for Android apps that allows for runtime manipulation and analysis of app behaviour.
      • ☆ Objection - A runtime mobile exploration tool for Android that provides various features for analysing, manipulating, and bypassing app security controls.
      • ☆ Objection - Runtime exploration tool to bypass app security controls.
      • RMS Runtime Mobile Security - Frida web interface.
      • jnitrace - Frida-based JNI API tracer.
      • SSLsplit - Intercepts and manipulates SSL/TLS encrypted traffic.
      • AutoDroid - Mass APK gathering and analysis tool.
      • ☆ FriDump - Uses Frida to dump memory of running apps.
      • ☆ Binder Trace - Intercepts and parses Android Binder messages.
      • Drozer - Framework for Android security testing with dynamic analysis features.
      • apk-mitm - Prepares APKs for HTTPS inspection.
      • jtrace - Similar to strace, but for Android system calls.
    • Static Analysis Tools

      • Android Studio - Useful for analyzing decompiled apps via an IDE.
      • QARK - An open-source tool developed by LinkedIn for automatic Android app vulnerability scanning, including identifying potential security issues such as SQL injection, insecure data storage, and more.
      • MobSF - An open-source mobile app security testing framework that supports static and dynamic analysis of Android apps for vulnerabilities and privacy issues.
      • AndroBugs Framework - An open-source framework for analysing and scanning Android apps for security issues, including static and dynamic analysis capabilities.
      • ☆ imjtool - Firmware unpacking tool applicable to the widest variety of vendors and formats.
      • disarm - A simple command line utility that takes as an argument a 32-bit hexadecimal number, and parses it as an ARM-64 instruction, providing the disassembly.
      • QARK - An open-source tool for automatic Android app vulnerability scanning.
      • AndroBugs Framework - Analyzes and scans Android apps for security issues.
      • MobSF - Supports both static and dynamic analysis for Android app security testing.
      • Quark Engine - Integrates various tools as Quark Script APIs for mobile security research.
      • Dexcalibur - Automated tool for analyzing and instrumenting Android applications.
      • simplify - Android virtual machine and deobfuscator.
      • ☆ APK Dependency Graph - Visualizes APK class dependencies.
      • COVA - Computes path constraints based on user-defined APIs.
      • DIS{integrity} - Analyzes APKs for root, integrity, and tamper detection.
      • ☆ Obfu[DE - De-obfuscation tool that uses fuzzy comparison logic.
      • TinySmaliEmulator - Minimalist smali emulator for "decrypting" obfuscated strings.
      • deoptfuscator - Tool for deobfuscating apps using control-flow obfuscation.
      • ☆ imjtool - Firmware unpacking tool for various vendors and formats.
      • disarm - Command line utility for parsing ARM-64 instructions.
    • Decompilers

      • JDGui - Graphical utility to view Java source from class files.
      • Radare2 - Reverse engineering framework with disassembly and debugging.
      • ☆ JADX - An open-source tool for decompiling and analysing Android APK files into Java source code for reverse engineering and analysis.
      • Procyon - Procyon is a suite of Java metaprogramming tools, including a rich reflection API, a LINQ-inspired expression tree API for runtime code generation, and a Java decompiler.
      • Cfr - An open-source Java decompiler that supports decompilation of Android APK files into Java source code, including support for newer Java language features.
      • FernFlower - Fernflower is the first actually working analytical decompiler for Java and probably for a high-level programming language in general.
      • ☆ Apktool - A popular open-source tool for decompiling and recompiling Android APK files.
      • DEX2JAR - A tool for converting Android DEX files to JAR files, which can be further analysed using Java decompilers.
      • IDA Pro - A powerful commercial disassembler and debugger for analysing Android native code.
      • ☆ Ghidra - A free and open-source software reverse engineering (SRE) framework developed by the National Security Agency (NSA) that supports Android analysis.
      • Radare2 - A free and open-source reverse engineering framework that supports Android analysis, including disassembly, debugging, and binary analysis.
      • Androguard - An open-source tool for analysing and reverse engineering Android apps, including decompiling APK files, analysing Dalvik bytecode, and more.
      • ☆ APKLab - VS Code extension integrating multiple tools.
      • show-java - APK, JAR & Dex decompiler.
      • ☆ JADX - Decompiles APKs into Java source code.
      • Androguard - Analyzes and reverse engineers Android apps.
      • DEX2JAR - Converts DEX files to JAR files.
      • APK Studio - Qt-based IDE for reverse-engineering APKs.
      • Cfr - Supports decompilation of Android APK files.
      • apk2gold - Decompiles Android apps to Java (note: may be outdated).
      • AndroidProjectCreator - Converts APKs to Android Studio projects.
      • Procyon - Suite of Java decompilation tools.
      • ☆ Apktool - Popular tool for decompiling/recompiling APK files.
      • ☆ Ghidra - Free and open-source SRE framework.
      • FernFlower - Analytical decompiler for Java.
    • Malware Analysis

      • DroidDetective - Machine learning malware analysis for Android apps.
      • Cuckoo Droid - Automated Android malware analysis with Cuckoo Sandbox.
      • androwarn - Static code analyzer for malicious Android applications.
  • CTFs and CrackMes

  • Obfuscation & Anti-Reversing

  • Training

  • Firmware & Kernel Analysis

    • Case Studies

      • Binwalk - Analyze, extract, and reverse engineer firmware images.
      • AFLSmart - Fuzzer optimized for firmware image analysis.
      • FirmWire - Dynamic analysis platform for baseband firmware.
      • Android Kernel Exploits - Collection of kernel vulnerabilities and exploit techniques.
  • Misc

  • Licence