An open API service indexing awesome lists of open source software.

https://github.com/alphaSeclab/android-security

Android Security Resources.
https://github.com/alphaSeclab/android-security

android android-debug-bridge android-malware android-security android-vuln apktool art-hook csploit dalvik-hook jadx jeb mobsf

Last synced: 10 months ago
JSON representation

Android Security Resources.

Awesome Lists containing this project

README

          

# [所有收集类项目](https://github.com/alphaSeclab/all-my-collection-repos)

# Android

- Android安全资源收集,初版。600+工具,1500+文章
- [English Version](https://github.com/alphaSeclab/android-security/blob/master/Readme_en.md)

# 目录
- [资源收集](#68d90d74dca98b4812bd082767343703)
- [(11) Github Repo](#767078c52aca04c452c095f49ad73956)
- [知名分析工具](#d3edc24d146d61221786f8e89c902397)
- [ClassyShark](#c52b14cea935b701a421cb2d44c590d3) -> [(3)工具](#4a8b5558129606951cf406d3717efc25) [(7)文章](#ebb31da97d52038330587e11aa3b7663)
- [jeb](#98e0f17cd07a3cf1e8ffc43a6237ecc6) -> [(14)工具](#56d0739e51ee737ac2dc2000714eb920) [(50)文章](#3205cec7f053205545589f9b332a3708)
- [enjarify](#190a50af2c6e312dab59310243dc9a07) -> [(2)工具](#1ab52c0bb8444157e2a6217c2c7a1783) [(1)文章](#a2e68c9be0b242e3fb4fd42a262c471a)
- [androguard](#019813c8858057c3b079ba9fbda7e61f) -> [(5)工具](#57ab0c9888130e35c2fc37f97537fdd3) [(14)文章](#0d6b1003c6e834560d9860f77f10e6b1)
- [jadx](#f136c28b41053e3d884385f33da22bb5) -> [(3)工具](#b36c7a8866ead5febf57b179811d6b35) [(3)文章](#bbf5db01b18fc4ceacd7d1bb6e456807)
- [jd-gui](#51f8cd240758c6723fe59e5fb7b5a941) -> [(2)工具](#732953dd03c164baa82b5189a1e883bb) [(3)文章](#b1b9fcec9b1935d4a5373e9907d5d1bb)
- [dex2jar](#d9716319ad6dac60048651a18e2b0a4b) -> [(5)工具](#541b58e9a1ee2bebf1295ae116fafa4d) [(2)文章](#32f4773a7e0739def1ab014fadb3db88)
- [apktool](#6d92b271b2e90e8b03d873712722adbe) -> [(13)工具](#2f014ba4bc98fef37272a1e4acc399f2) [(40)文章](#8b6c1a37516d86d729d05ad769e5d681)
- [virtualapk](#63bfb9519c279be953eca5c8f99757fa) -> [(1)工具](#66019021f5ace5c41bf5de20be94f9e3)
- [baksmali](#40180b771f8762f1470aa38b19afc1e1) -> [(2)工具](#c762fd140130e8f90c51d58f3e01288a) [(4)文章](#f84bf9c4269ace64fe1a216046c67d62)
- [cSploit](#3e5efcb723ddb311526b0cf27a095117) -> [(4)工具](#61012694dfaf7dc87ef7a0738a005818) [(4)文章](#47fbd63ae0e4321d98e09951fd37f1bb)
- [bytecodeviewer](#6ad1dd69e315677a2252c1c8e8620572) -> [(2)工具](#26f401339eb01096e69d6c650abe51df)
- [MobSF](#1ed0d3c6279ba30df06262de9c24cdd8) -> [(3)工具](#9c93b893f550d7c8cf4a19cce06e177b) [(6)文章](#9e5612f2c728bdbbca8b2571bd94cd79)
- [androl4b](#eccb49e7c71be9df25fec6d241d18f8e) -> [(1)工具](#800724f7b844e2293370510700c6ca73) [(4)文章](#42ea2fc802be5efdd7bc656aa39446cb)
- [decaf](#78c2fbcadbbfda5a1448c6f150a9251d) -> [(3)工具](#0c3c1ab3d169db8cc058a0d72cb6aa1d) [(4)文章](#9843fb6cfb113c357deaf0dac05b22a8)
- [cuckoo-droid](#b32978986b1ad7ff33a1ff4ee968190c) -> [(1)工具](#1532c5ea999fcd785571a78ca3fed8f6)
- [各类App](#a054356d9fb3b22c638a5c49406e230a)
- [ahmyth](#51c70b0a90c17e4c3591c5997ffb1283) -> [(1)工具](#8192031d06c545c465a838c13002ef27) [(3)文章](#1d343a8e2abaf1bcdb2c7952fbab8ad1)
- [(8) 工具](#1ab9ebcde9606f3e02a0dcd6c48411ad)
- [Topic](#a3f24c3d0190fbd519cce450f423b86e)
- [漏洞](#73b51525ab1548eba12f897ff482d785) -> [(79)工具](#d39d72e9362eda71cef10de260f43107) [(476)文章](#d5f45ceee87e1d68df9fe75801285e9e)
- [恶意代码](#1e2d63c4b03a69a79a5543b4b0f395a7) -> [(43)工具](#9a60c82748643599d1c1a46dc183ab88) [(471)文章](#139ddb12762052da5ebe038c455162fa)
- [取证](#fcb2e498f1a3378bf3e2dd5adda43e03) -> [(7)工具](#0cddb153bfea5b5abcf0f4a44be6ccc5) [(37)文章](#73a56c2788dc27af4f49cbf1811ee1e9)
- [Hook](#70cd678f065f0cbd109b5fb665aed139)
- [XPosed](#07c5aa963e1201a7c162ccb84ec1fb28) -> [(9)工具](#41ac1eb0f56af536a7aed91a6983e95f) [(8)文章](#dc6d6d158e806f4f9d02ed8b43c5c501)
- [Frida](#7de48e67d0fc795c29ba29ea12c6db80) -> [(5)工具](#f70d1610a9446395aa5de9cae70b43c3) [(9)文章](#997a6a2140fc004cb639429adfb68ac7)
- [(25) 工具](#4e9f32429486266721e7e21efa0ce727)
- [(43) 文章](#c52fb5d0961a84619a88a875380554c1)
- [加固&&破解](#df9d9982d70a9b99fdfc0c27bac60e12) ->
- [其他](#c8cd36b0b75c53d7b4caa914f6dd2600)
- [Dalvik](#5b17938e2cb613edbe566bc475877103) -> [(13)工具](#d1c1bf3368f35715c87fa697dc021d06) [(45)文章](#66b8d79829c4b1448d9ad702333097d8)
- [APK-Xxx](#884f1a8ba4dc1bba9a0d7ecb748fd28c) -> [(94)工具](#a4b01e00010adcea40d99cd2047eed8b)
- [ADB](#ef7dc42448191170a38b470d6df851fc) -> [(23)工具](#ade3cb4479c4d96476509d1d7b4584b8) [(61)文章](#0ad73dcc365a651ead2ea75d93c5be9b)
- [IDA Pro](#92fdafffc262b0a0427a9f2e40203503) -> [(4)工具](#50fae763dd75614bc2f4390fba4925a3) [(7)文章](#f19c751a88ffad37105cdd3da817e70a)
- [Frida](#ac4c5990ef8ae8de989ee9160684127b) -> [(24)工具](#5200b384a3876135b11fedf6f23496ce) [(29)文章](#f9fd19a349a4b18d553d0c4ec4865764)
- [工具](#ea3c7c05861352ae1d05ce28cf745e7e)
- [文章](#39226e999eb0a6673919aeea22921d0b)

# 资源收集

***

## Github Repo

- [**4411**星][3m] [Shell] [ashishb/android-security-awesome](https://github.com/ashishb/android-security-awesome) A collection of android security related resources
- [**1673**星][3y] [Shell] [juude/droidreverse](https://github.com/juude/droidreverse) android 逆向工程工具集
- [**672**星][4m] [doridori/android-security-reference](https://github.com/doridori/android-security-reference) A W.I.P Android Security Ref
- [**509**星][2y] [b-mueller/android_app_security_checklist](https://github.com/b-mueller/android_app_security_checklist) Android App Security Checklist
- [**443**星][1m] [jnusimba/androidsecnotes](https://github.com/jnusimba/androidsecnotes) some learning notes about Android Security
- [**135**星][2m] [C++] [chenenyu/androidsecurity](https://github.com/chenenyu/androidsecurity) Android安全实践
- [**98**星][4y] [Java] [zencodex/hack-android](https://github.com/zencodex/hack-android) Collection tools for hack android, java
- [**79**星][11m] [wufengxue/android-reverse](https://github.com/wufengxue/android-reverse) 安卓逆向工具汇总
- [**74**星][3y] [wtsxdev/android-security-list](https://github.com/wtsxdev/android-security-list) Collection of Android security related resources
- [**66**星][1y] [pfalcon/awesome-linux-android-hacking](https://github.com/pfalcon/awesome-linux-android-hacking) List of hints and Q&As to get most of your Linux/Android device
- [**33**星][3y] [nextco/android-decompiler](https://github.com/nextco/android-decompiler) A hight quality list of tools to reverse engineering code from android.

# 知名分析工具

***

## ClassyShark

### 工具

- [**6164**星][5m] [Java] [google/android-classyshark](https://github.com/google/android-classyshark) 分析基于Android/Java的App或游戏
- [**189**星][3m] [borisf/classyshark-user-guide](https://github.com/borisf/classyshark-user-guide) Everything you want to know how to use ClassyShark
- [**189**星][2y] [Kotlin] [borisf/classyshark-bytecode-viewer](https://github.com/borisf/classyshark-bytecode-viewer) Browse your Java/Kotlin compiled code

### 文章

- 2017.02 [BorisFarber] [Exporting types from Android app using ClassyShark](https://medium.com/p/7cd2be18cdf7)
- 2016.11 [BorisFarber] [ClassyShark Product Docs](https://medium.com/p/6ad01bbdb9eb)
- 2016.11 [BorisFarber] [Exporting data from ClassyShark](https://medium.com/p/e3cf3fe3fab8)
- 2016.11 [BorisFarber] [APK Dashboard in ClassyShark](https://medium.com/p/9346318bf5c6)
- 2016.01 [freebuf] [ClassyShark:轻便的安卓可执行文件浏览器](http://www.freebuf.com/sectool/92655.html)
- 2015.12 [BorisFarber] [ClassyShark supports native code browsing](https://medium.com/p/a4985e7126b1)
- 2015.12 [BorisFarber] [Welcome ClassyShark](https://medium.com/p/b632ae8488b4)

***

## jeb

### 工具

- [**93**星][2m] [Py] [pnfsoftware/jeb2-samplecode](https://github.com/pnfsoftware/jeb2-samplecode) Sample extensions for JEB Decompiler
- [**78**星][4y] [Java] [enovella/jebscripts](https://github.com/enovella/jebscripts) A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
- [**69**星][6m] [Py] [hamz-a/jeb2frida](https://github.com/hamz-a/jeb2frida) Automated Frida hook generation with JEB
- [**58**星][1m] [Java] [pnfsoftware/jeb2-androsig](https://github.com/pnfsoftware/jeb2-androsig) Android Library Code Recognition
- [**38**星][10m] [Java] [pnfsoftware/jnihelper](https://github.com/pnfsoftware/jnihelper) jeb-plugin-android-jni-helper
- [**37**星][3m] [Py] [pnfsoftware/jeb-golang-analyzer](https://github.com/pnfsoftware/jeb-golang-analyzer) JEB scripts for Golang executables analysis
- [**34**星][9m] [Py] [idhyt/jeb-keygen](https://github.com/idhyt/jeb-keygen) JEB install env
- [**30**星][10m] [Java] [pnfsoftware/jeb2-plugin-oat](https://github.com/pnfsoftware/jeb2-plugin-oat) Android OAT Plugin for JEB
- [**20**星][2y] [Java] [pnfsoftware/pleaserop](https://github.com/pnfsoftware/pleaserop) Architecture-agnostic ROP gadget finder using JEB's IR
- [**19**星][9m] [Java] [pnfsoftware/jeb-plugin-libra](https://github.com/pnfsoftware/jeb-plugin-libra) Libra decompiler plugin for JEB
- [**13**星][1y] [Java] [pnfsoftware/jeb2-andhook](https://github.com/pnfsoftware/jeb2-andhook)
- [**5**星][1y] [Java] [pnfsoftware/jeb-native-ir-optimizer-example1](https://github.com/pnfsoftware/jeb-native-ir-optimizer-example1)
- [**5**星][10m] [Java] [pnfsoftware/jeb2-plugin-pdf](https://github.com/pnfsoftware/jeb2-plugin-pdf) PDF Analyzer Plugin for JEB
- [**1**星][3y] [Java] [pnfsoftware/jeb2-plugin-avqu](https://github.com/pnfsoftware/jeb2-plugin-avqu) JEB Plugin Extractor for Anti-Virus Quarantine files

### 文章

- 2020.02 [pnfsoftware] [JEB Android Updates – Lambda Recovery, Unreflecting Code, Generic String Decryption, and More](https://www.pnfsoftware.com/blog/jeb-lambda-recovery-and-generic-string-decryption/)
- 2019.10 [securify] [Automated Frida hook generation with JEB](https://www.securify.nl/en/blog/SFY20191006/automated-frida-hook-generation-with-jeb.html)
- 2019.01 [pnfsoftware] [JEB Native Analysis Pipeline – Part 2: IR Optimizers](https://www.pnfsoftware.com/blog/jeb-native-pipeline-ir-optimizers-part-2/)
- 2019.01 [pnfsoftware] [JEB 3.1 and JEB Home Edition x86](https://www.pnfsoftware.com/blog/jeb3-release-and-jeb-home-edition-x86/)
- 2019.01 [pnfsoftware] [JEB Native Analysis Pipeline – Part 1: Intermediate Representation](https://www.pnfsoftware.com/blog/jeb-native-pipeline-intermediate-representation/)
- 2018.11 [pediy] [[原创] 如何优雅的延长JEB demo的有效期](https://bbs.pediy.com/thread-247935.htm)
- 2018.09 [pnfsoftware] [JEB3 Auto-Signing Mode](https://www.pnfsoftware.com/blog/jeb3-auto-signing-mode/)
- 2018.05 [pediy] [[原创]JEB2反混淆神器](https://bbs.pediy.com/thread-227046.htm)
- 2018.05 [pnfsoftware] [JEB 3 Alpha is available](https://www.pnfsoftware.com/blog/jeb3-alpha-is-available/)
- 2018.02 [pnfsoftware] [DEX Version 39, Dalvik and ART Opcode Overlaps, and JEB 2.3.11](https://www.pnfsoftware.com/blog/dex-version-39-new-dalvik-opcodes/)
- 2017.11 [pediy] [[原创]java应用破解之破解 jeb mips 2.3.3](https://bbs.pediy.com/thread-222503.htm)
- 2017.10 [pnfsoftware] [JEB 恶意软件分享平台](https://www.pnfsoftware.com/blog/introducing-the-jeb-malware-sharing-network/)
- 2017.10 [pnfsoftware] [DEX and APK Updates in JEB 2.3.5](https://www.pnfsoftware.com/blog/dex-and-apk-updates-in-jeb-2-3-5/)
- 2017.09 [flanker017] [JEB2插件教程之一](https://blog.flanker017.me/writing-jeb2-plugin/)
- 2017.09 [aliyun] [编写自己的JEB2插件](https://xz.aliyun.com/t/46)
- 2017.09 [360] [以DVRF(路由器漏洞靶机)为例解读JEB固件漏洞利用(Part 1)](https://www.anquanke.com/post/id/86747/)
- 2017.08 [pnfsoftware] [Firmware exploitation with JEB part 3: Reversing the SmartRG’s sr505n](https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-3-reversing-the-smartrgs-sr505n/)
- 2017.08 [4hou] [以DVRF(路由器漏洞靶机)为例解读JEB固件漏洞利用](http://www.4hou.com/technology/7382.html)
- 2017.08 [pnfsoftware] [如何利用 JEB 的 MIPS 反编译器来挖掘和利用嵌入式设备的软件漏洞](https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-2/)
- 2017.08 [pnfsoftware] [如何利用 JEB 的 MIPS 反编译器来挖掘和利用嵌入式设备的软件漏洞](https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-1/)
- 2017.06 [pediy] [[原创] JEB2插件,导出APK资源文件](https://bbs.pediy.com/thread-218302.htm)
- 2017.05 [pnfsoftware] [JEB 2.3 and MIPS Decompilation](https://www.pnfsoftware.com/blog/jeb-mips-decompilation/)
- 2017.04 [pnfsoftware] [Analyzing a New MIPS IoT Malware With JEB](https://www.pnfsoftware.com/blog/analyzing-mips-iot-malware-with-jeb/)
- 2016.09 [pnfsoftware] [Library Code Matching for Android with JEB](https://www.pnfsoftware.com/blog/jeb-library-code-matching-for-android/)
- 2016.08 [pediy] [[下载]jeb2.2.5 破解版](https://bbs.pediy.com/thread-212332.htm)
- 2016.03 [pnfsoftware] [An introduction to JEB Android Debuggers](https://www.pnfsoftware.com/blog/jeb-android-debuggers/)
- 2016.02 [pnfsoftware] [User interface how-to in JEB](https://www.pnfsoftware.com/blog/jeb-ui-how-to/)
- 2015.12 [pnfsoftware] [Changes in JEB 2.1… And a holiday season gift](https://www.pnfsoftware.com/blog/what-s-new-in-jeb-2-1/)
- 2015.12 [pnfsoftware] [Scanning PDF Files using JEB2](https://www.pnfsoftware.com/blog/scanning-pdf-files-using-jeb2/)
- 2015.11 [pnfsoftware] [Writing client scripts for JEB2 using Python](https://www.pnfsoftware.com/blog/writing-jeb2-scripts-in-python/)
- 2015.10 [pnfsoftware] [Developing JEB2 parsers and plugins](https://www.pnfsoftware.com/blog/developing-jeb2-plugins/)
- 2015.09 [pnfsoftware] [Setting up JEB2 to parse optimized DEX (odex) files](https://www.pnfsoftware.com/blog/setting-up-jeb2-to-parse-odex-files/)
- 2015.09 [pnfsoftware] [JEB2 introduction videos](https://www.pnfsoftware.com/blog/jeb2-introduction-videos/)
- 2015.08 [pnfsoftware] [JEB2 available to all customers](https://www.pnfsoftware.com/blog/jeb2-available-to-all-customers/)
- 2015.07 [pediy] [[分享]JEB 1.5.201408040(full) 补充全平台keygen](https://bbs.pediy.com/thread-202840.htm)
- 2015.07 [pediy] [JEB 1.5.201408040(full) + keygen](https://bbs.pediy.com/thread-202793.htm)
- 2015.07 [pnfsoftware] [JEB2 plugins for document formats](https://www.pnfsoftware.com/blog/jeb2-plugins/)
- 2015.06 [flanker017] [Advanced Android Application Analysis Series – JEB API Manual and Plugin Writing](https://blog.flanker017.me/advanced-android-application-analysis-jeb-api-manual-and-plugin-writing/)
- 2015.06 [pnfsoftware] [What is changing with JEB2](https://www.pnfsoftware.com/blog/what-is-changing-with-jeb2/)
- 2015.06 [pnfsoftware] [Announcing JEB2](https://www.pnfsoftware.com/blog/announcing-jeb2/)
- 2014.08 [pnfsoftware] [JEB Jar Plugins](https://www.pnfsoftware.com/blog/jeb-jar-plugins/)
- 2014.07 [pediy] [用Javassis分析jeb.jar](https://bbs.pediy.com/thread-190642.htm)
- 2014.07 [pediy] [JEB(破解更新2014-07-16)](https://bbs.pediy.com/thread-189980.htm)
- 2014.03 [pnfsoftware] [Developing JEB plugins in Java with Eclipse](https://www.pnfsoftware.com/blog/developing-jeb-plugins-in-java-with-eclipse/)
- 2013.09 [pnfsoftware] [Decompiled Java Code Manipulation using JEB API – Part 3: Defeating Reflection](https://www.pnfsoftware.com/blog/decompiled-java-code-manipulation-using-jeb-api-part-3-defeating-reflection/)
- 2013.09 [pnfsoftware] [Decompiled Java Code Manipulation using JEB API – Part 2: Decrypting Strings](https://www.pnfsoftware.com/blog/decompiled-java-code-manipulation-using-jeb-api-part-2-decrypting-strings/)
- 2013.09 [pnfsoftware] [Decompiled Java Code Manipulation using JEB API – Part 1: Removing Junk Code](https://www.pnfsoftware.com/blog/decompiled-java-code-manipulation-using-jeb-api-part-1-removing-junk-code/)
- 2013.08 [pnfsoftware] [JEB Plugin How-To: Jump to an Activity](https://www.pnfsoftware.com/blog/jeb-plugin-how-to-jump-to-an-activity/)
- 2013.07 [pnfsoftware] [JEB 1.3: How to Sign and Match Third-Party Library Code](https://www.pnfsoftware.com/blog/jeb-1-3-how-to-sign-and-match-third-party-library-code/)
- 2013.05 [pnfsoftware] [JEB’s decompiled sources for Android/BadNews.A](https://www.pnfsoftware.com/blog/jebs-decompiled-sources-for-androidbadnews-a/)

***

## enjarify

### 工具

- [**2467**星][3y] [Py] [google/enjarify](https://github.com/google/enjarify) 将Dalvik字节码转换为对应的Java字节码
- [**516**星][5m] [Py] [storyyeller/enjarify](https://github.com/storyyeller/enjarify) 将Dalvik字节码转为对应的Java字节码(google Fork版)

### 文章

- 2015.10 [Roland] [Google自己出品的dex转jar工具enjarify的介绍](https://blog.csdn.net/Roland_Sun/article/details/49274307)

***

## androguard

### 工具

- [**2890**星][3m] [Py] [androguard/androguard](https://github.com/androguard/androguard) Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)
- [**60**星][2y] [C] [koodous/androguard-yara](https://github.com/koodous/androguard-yara) Module to use Androguard with Yara
- [**57**星][1y] [Py] [programa-stic/marvin-static-analyzer](https://github.com/programa-stic/marvin-static-analyzer) Marvin static analyzer is an Android application vulnerability scanner. The framework uses androguard and Static Android Analysis Framework (SAAF).
- [**32**星][2y] [dweinstein/dockerfile-androguard](https://github.com/dweinstein/dockerfile-androguard) docker file for use with androguard python android app analysis tool
- [**2**星][2y] [h4ng3r/r2dextest](https://github.com/h4ng3r/r2dextest) Dalvik tests generator for radare2 using on androguard

### 文章

- 2018.04 [infosecinstitute] [Android Penetration Tools Walkthrough Series: Androguard](http://resources.infosecinstitute.com/android-penetration-tools-walkthrough-series-androguard/)
- 2016.09 [venus] [Androguard补完计划——锁定字符串解密函数](https://paper.seebug.org/43/)
- 2016.09 [venus] [Androguard补完计划——提取加密字符串](https://paper.seebug.org/40/)
- 2015.10 [angelalonso] [Malware Analysis with Androguard: a practical case](http://blog.angelalonso.es/2015/10/malware-analysis-with-androguad.html)
- 2015.10 [spreitzenbarth] [Androguard: A simple step by step guide](https://forensics.spreitzenbarth.de/2015/10/05/androguard-a-simple-step-by-step-guide/)
- 2014.11 [k3170makan] [Automated DEX Decompilation using Androguard part II: Dex2Java](http://blog.k3170makan.com/2014/11/automated-dex-decompilation-using_23.html)
- 2014.11 [k3170makan] [Automated DEX Decompilation using Androguard](http://blog.k3170makan.com/2014/11/automated-dex-decompilation-using.html)
- 2014.09 [pentestcorner] [Androguard plugin for Sublime Text: Installation and usage](http://pentestcorner.com/androguard-plugin-for-sublime-text-installation-and-usage/)
- 2014.09 [pediy] [[原创]静态开源工具Androguard 常用API手册](https://bbs.pediy.com/thread-192602.htm)
- 2014.07 [Roland] [如何在Ubuntu 12.04上安装Androguard](https://blog.csdn.net/Roland_Sun/article/details/38083569)
- 2013.05 [pediy] [[原创]windows下编译安装androguard](https://bbs.pediy.com/thread-172645.htm)
- 2012.12 [n0where] [Android Application Analysis: Androguard](https://n0where.net/android-application-analysis-androguard)
- 2012.05 [pediy] [[原创]Androguard软件安装方法](https://bbs.pediy.com/thread-151100.htm)
- 2012.02 [toolswatch] [Androguard (Android Guard) v1.0 RC 1](http://www.toolswatch.org/2012/02/androguard-android-guard-v1-0-rc-1/)

***

## jadx

### 工具

- [**21172**星][1m] [Java] [skylot/jadx](https://github.com/skylot/jadx) dex 转 java 的反编译器
- [**89**星][2m] [C++] [romainthomas/pyjadx](https://github.com/romainthomas/pyjadx) Jadx Python Binding
- [**9**星][1y] [PHP] [vaibhavpandeyvpz/deapk](https://github.com/vaibhavpandeyvpz/deapk) DeAPK is an open-source, online APK decompiler which lets you upload an APK and then decompile it to Smali or Java sources. It is built using Laravel, Vue.js, Bootstrap, FontAwesome, Pusher, Redis, MySQL, apktool, jadx and hosted atop DigitalOcean cloud platform.

### 文章

- 2019.10 [secplicity] [Android APK Reverse Engineering: Using JADX](https://www.secplicity.org/2019/10/04/android-apk-reverse-engineering-using-jadx/)
- 2015.01 [n0where] [Dex to Java Decompiler: jadx](https://n0where.net/dex-to-java-decompiler-jadx)
- 2014.03 [androidcracking] [jadx - Dex to Java decompiler](http://androidcracking.blogspot.com/2014/03/jadx-dex-to-java-decompiler.html)

***

## jd-gui

### 工具

- [**7968**星][3m] [Java] [java-decompiler/jd-gui](https://github.com/java-decompiler/jd-gui) A standalone Java Decompiler GUI
- [**109**星][2m] [Java] [java-decompiler/jd-core](https://github.com/java-decompiler/jd-core) JD-Core is a JAVA decompiler written in JAVA.

### 文章

- 2014.06 [willhackforsushi] [Code to Create a JD-GUI Error](http://www.willhackforsushi.com/?p=562)
- 2014.02 [androidcracking] [zerdei's luyten, a worthwhile jd-gui alternative](http://androidcracking.blogspot.com/2014/02/zerdeis-luyten-worthwhile-jd-gui.html)
- 2013.03 [pediy] [[原创]反编译工具dava的使用,个人觉得效果比jad/jd-gui效果好](https://bbs.pediy.com/thread-167198.htm)

***

## dex2jar

### 工具

- [**7142**星][7m] [Java] [pxb1988/dex2jar](https://github.com/pxb1988/dex2jar) Tools to work with android .dex and java .class files
- [**100**星][7m] [Java] [dexpatcher/dex2jar](https://github.com/dexpatcher/dex2jar) Unofficial dex2jar builds
- [**85**星][1m] [Py] [tp7309/ttdedroid](https://github.com/tp7309/ttdedroid) 一键反编译工具One key for quickly decompile apk/aar/dex/jar, support by jadx/dex2jar/enjarify/cfr.
- [**68**星][5y] [Py] [ajinabraham/xenotix-apk-reverser](https://github.com/ajinabraham/xenotix-apk-reverser) Xenotix APK Reverser is an OpenSource Android Application Package (APK) decompiler and disassembler powered by dex2jar, baksmali and jd-core.
- [**60**星][7y] [Java] [strazzere/dehoser](https://github.com/strazzere/dehoser) Unpacker for the HoseDex2Jar APK Protection which packs the original file inside the dex header

### 文章

- 2019.04 [X0x6d696368] [Ghidra: Android APK (it's basically dex2jar with a .dex decompiler)](https://www.youtube.com/watch?v=At_T6riSb9A)
- 2013.01 [androidcracking] [string decryption with dex2jar](http://androidcracking.blogspot.com/2013/01/string-decryption-with-dex2jar.html)

***

## apktool

### 工具

- [**9536**星][1m] [Java] [ibotpeaches/apktool](https://github.com/ibotpeaches/apktool) A tool for reverse engineering Android apk files
- [**725**星][2m] [Java] [rover12421/shakaapktool](https://github.com/rover12421/shakaapktool) ShakaApktool
- [**557**星][3y] [Java] [linchaolong/apktoolplus](https://github.com/linchaolong/apktoolplus) apk 逆向分析工具
- [**428**星][2y] [Py] [evilsocket/smali_emulator](https://github.com/evilsocket/smali_emulator) This software will emulate a smali source file generated by apktool.
- [**331**星][7y] [Java] [brutall/brut.apktool](https://github.com/brutall/brut.apktool) A tool for reverse engineering Android apk files
- [**100**星][1y] [winterssy/miui-purify](https://github.com/winterssy/miui-purify) 个人兴趣项目存档,使用 apktool 魔改 MIUI ROM,去除 MIUI 系统新增的广告。
- [**73**星][6m] [Ruby] [devunwired/apktools](https://github.com/devunwired/apktools) Ruby library for reading/parsing APK resource data
- [**26**星][2m] [Visual Basic] [modify24x7/ultimate-advanced-apktool](https://github.com/modify24x7/ultimate-advanced-apktool) v4.1
- [**23**星][2m] [lexiie/termux-apktool](https://github.com/lexiie/termux-apktool) Decompile and Recompile android aplication use termux without openjdk installed
- [**11**星][7m] [Dockerfile] [theanam/docker-apktool](https://github.com/theanam/docker-apktool) Docker image for Latest Apktool
- [**6**星][1y] [Py] [h4ng3r/r2apktool](https://github.com/h4ng3r/r2apktool) radare2 based alternative to apktool
- [**6**星][2y] [CSS] [oscar0812/apktoolfx](https://github.com/oscar0812/apktoolfx) A GUI for Apktool to make reverse engineering of android apps a breeze.
- [**None**星][iBotPeaches/apktool](https://bitbucket.org/iBotPeaches/apktool/downloads/)

### 文章

- 2019.03 [connortumbleson] [Apktool v2.4.0 Released](https://connortumbleson.com/2019/03/03/apktool-v2-4-0-released/)
- 2018.05 [pentesttoolz] [How to Reverse Engineer (Decompile/Recompile) Android Apk Files – Apktool and Kali Linux 2018.2](https://pentesttoolz.com/2018/05/19/how-to-reverse-engineer-decompile-recompile-android-apk-files-apktool-and-kali-linux-2018-2/)
- 2018.04 [connortumbleson] [Apktool v2.3.3 Released](https://connortumbleson.com/2018/04/29/apktool-v2-3-3-released/)
- 2018.04 [infosecinstitute] [Android Penetration Tools Walkthrough Series: Apktool](http://resources.infosecinstitute.com/android-penetration-tools-walkthrough-series-apktool/)
- 2018.04 [connortumbleson] [Apktool v2.3.2 Released](https://connortumbleson.com/2018/04/07/apktool-v2-3-2-released/)
- 2018.04 [pentesttoolz] [Apktool – A Tool For Reverse Engineering Android APK Files](https://pentesttoolz.com/2018/04/04/apktool-a-tool-for-reverse-engineering-android-apk-files/)
- 2018.01 [pentesttoolz] [Apktool – Reverse Engineering Android apk Files](https://pentesttoolz.com/2018/01/09/apktool-reverse-engineering-android-apk-files/)
- 2018.01 [n0where] [Reverse Engineering Android apk Files: Apktool](https://n0where.net/reverse-engineering-android-apk-files-apktool)
- 2017.12 [connortumbleson] [Apktool v2.3.1 Released](https://connortumbleson.com/2017/12/26/apktool-v2-3-1-released/)
- 2017.12 [tencent] [Android开发工具Apktool漏洞利用分析](https://security.tencent.com/index.php/blog/msg/122)
- 2017.12 [360] [Apktool未正确解析XML导致的XXE漏洞分析](https://www.anquanke.com/post/id/89316/)
- 2017.09 [connortumbleson] [Apktool v2.3.0 Released](https://connortumbleson.com/2017/09/21/apktool-v2-3-0-released/)
- 2017.07 [connortumbleson] [Apktool v2.2.4 Released](https://connortumbleson.com/2017/07/29/apktool-v2-2-4-released/)
- 2017.06 [connortumbleson] [Apktool v2.2.3 Released](https://connortumbleson.com/2017/06/13/apktool-v2-2-3-released/)
- 2017.01 [connortumbleson] [Apktool v2.2.2 Released](https://connortumbleson.com/2017/01/23/apktool-v2-2-2-released/)
- 2016.10 [connortumbleson] [Apktool v2.2.1 Released](https://connortumbleson.com/2016/10/18/apktool-v2-2-1-released/)
- 2016.08 [connortumbleson] [Apktool v2.2.0 Released](https://connortumbleson.com/2016/08/07/apktool-v2-2-0-released/)
- 2016.05 [onready] [Modification APK with apktool](https://onready.me/apk_modification_with_apktool.html)
- 2016.05 [connortumbleson] [Apktool v2.1.1 Released](https://connortumbleson.com/2016/05/07/apktool-v2-1-1-released/)
- 2016.03 [connortumbleson] [Apktool v2.1.0 Released](https://connortumbleson.com/2016/03/27/apktool-v2-1-0-released/)
- 2015.12 [connortumbleson] [Apktool v2.0.3 Released](https://connortumbleson.com/2015/12/31/apktool-v2-0-3-released/)
- 2015.10 [connortumbleson] [Apktool v2.0.2 Released](https://connortumbleson.com/2015/10/12/apktool-v2-0-2-released/)
- 2015.07 [connortumbleson] [Apktool v2.0.1 Released](https://connortumbleson.com/2015/07/15/apktool-2-0-1-released/)
- 2015.04 [connortumbleson] [Apktool v2.0.0 Released](https://connortumbleson.com/2015/04/20/apktool-v2-0-0-released/)
- 2015.04 [connortumbleson] [Apktool: Fixing Bug 761](https://connortumbleson.com/2015/04/10/apktool-fixing-bug-761/)
- 2015.02 [connortumbleson] [Apktool: Fixing Bug 713](https://connortumbleson.com/2015/02/16/fixing-apktool-bug713/)
- 2015.02 [connortumbleson] [Apktool 2.0.0 RC4 Released](https://connortumbleson.com/2015/02/12/apktool-2-0-0-rc4-released/)
- 2014.11 [connortumbleson] [Apktool 2.0.0 RC3 Released](https://connortumbleson.com/2014/11/26/apktool-rc3-released/)
- 2014.10 [connortumbleson] [Apktool 2.0.0 RC2 Released](https://connortumbleson.com/2014/10/05/apktool-2-0-0-rc2-released/)
- 2014.05 [Roland] [Android无源码调试APK(使用ApkTool和Eclipse ADT)](https://blog.csdn.net/Roland_Sun/article/details/26399669)
- 2014.02 [connortumbleson] [Apktool 2.0.0 Beta 9 Released](https://connortumbleson.com/2014/02/06/apktool-2-0-0-beta-9-released/)
- 2013.10 [connortumbleson] [Apktool 2.0.0 Beta 7 Released](https://connortumbleson.com/2013/10/13/apktool-2-0-0-beta-7-released/)
- 2013.08 [pediy] [[原创]安卓加密壳(dexcrypt) , 防止apktool,dex2jar 等工具逆向你的apk,附上下载地址](https://bbs.pediy.com/thread-177590.htm)
- 2013.05 [lhj0711010212] [apktool + smali + dex2jar + jdgui实现apk反编译](https://blog.csdn.net/lhj0711010212/article/details/8993711)
- 2013.05 [pediy] [[原创]Apk修改利器:ApkToolkit v2.1](https://bbs.pediy.com/thread-171368.htm)
- 2013.04 [pediy] [[原创]Apk修改利器:ApkToolkit v2.0](https://bbs.pediy.com/thread-169975.htm)
- 2013.02 [pediy] [[原创]Apk修改利器:ApkToolkit v1.1](https://bbs.pediy.com/thread-163267.htm)
- 2012.03 [pediy] [[原创]ApktoolGui v2.0 Final [3月18日添加运行环境检测功能,暂不支持Android 4.0]](https://bbs.pediy.com/thread-148006.htm)
- 2011.07 [pediy] [[下载]ApkTool-GUI1.3.5内测版下载](https://bbs.pediy.com/thread-137114.htm)
- 2010.10 [androidcracking] [unexplainable problems after recompilation with apktool](http://androidcracking.blogspot.com/2010/10/unexplainable-problems-after.html)

***

## virtualapk

### 工具

- [**7760**星][1y] [Java] [didi/virtualapk](https://github.com/didi/virtualapk) A powerful and lightweight plugin framework for Android

***

## baksmali

### 工具

- [**4152**星][1m] [Java] [jesusfreke/smali](https://github.com/jesusfreke/smali) smali/baksmali
- [**28**星][1y] [Smali] [strazzere/emacs-smali](https://github.com/strazzere/emacs-smali) Smali/Baksmali mode for Emacs

### 文章

- 2018.04 [infosecinstitute] [Android Penetration Tools Walkthrough Series Dex2Jar, JD-GUI, and Baksmali](http://resources.infosecinstitute.com/android-penetration-tools-walkthrough-series-dex2jar-jd-gui-baksmali/)
- 2013.05 [lhj0711010212] [AXMLPrinter2 baksmali smali dex2jar 反编译文件用法](https://blog.csdn.net/lhj0711010212/article/details/8993722)
- 2013.05 [lhj0711010212] [baksmali和smali工具的使用](https://blog.csdn.net/lhj0711010212/article/details/8993667)
- 2013.05 [lhj0711010212] [Android 中编译,反编译,AXMLPrinter2,smali,baksmali](https://blog.csdn.net/lhj0711010212/article/details/8993581)

***

## cSploit

### 工具

- [**2368**星][1y] [Java] [csploit/android](https://github.com/csploit/android) cSploit - The most complete and advanced IT security professional toolkit on Android.
- [**60**星][7m] [HTML] [csploit/csploit.github.io](https://github.com/csploit/csploit.github.io) website for cSploit organization
- [**34**星][2y] [Go] [csploit/daemon](https://github.com/csploit/daemon) the core of the cSploit project
- [**24**星][4y] [C] [csploit/network-radar](https://github.com/csploit/network-radar) cSploit network radar

### 文章

- 2020.01 [BlackHat] [ACSploit: Exploit Algorithmic Complexity Vulnerabilities](https://www.youtube.com/watch?v=FAVD_awNeeA)
- 2016.08 [TechnoHacker] [How to use cSploit (pentesting toolkit for Android!)](https://www.youtube.com/watch?v=UVhXshriZM8)
- 2016.06 [hackingarticles] [Hack your Network through Android Phone using cSploit](http://www.hackingarticles.in/hack-network-android-phone-using-csploit/)
- 2016.05 [cyberarms] [DNS Spoofing with Nethunter, cSploit & Kali Linux](https://cyberarms.wordpress.com/2016/05/28/dns-spoofing-with-nethunter-csploit-kali-linux/)

***

## bytecodeviewer

### 工具

- [**10890**星][4m] [Java] [konloch/bytecode-viewer](https://github.com/konloch/bytecode-viewer) A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
- [**1123**星][2m] [Kotlin] [ingokegel/jclasslib](https://github.com/ingokegel/jclasslib) jclasslib bytecode viewer is a tool that visualizes all aspects of compiled Java class files and the contained bytecode.

***

## MobSF

### 工具

- [**5441**星][1m] [Py] [mobsf/mobile-security-framework-mobsf](https://github.com/MobSF/Mobile-Security-Framework-MobSF) Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
- [**25**星][6m] [Shell] [soluto/mobsf-ci](https://github.com/soluto/mobsf-ci) All that is required to run MobSF in the ci
- [**21**星][2m] [Java] [mobsf/mobsf-related-materials](https://github.com/mobsf/mobsf-related-materials) MobSF related Presentations, Slides and Others.

### 文章

- 2018.04 [infosecinstitute] [Android Penetration Tools Walkthrough Series: MobSF](http://resources.infosecinstitute.com/android-penetration-tools-walkthrough-series-mobsf/)
- 2017.08 [freebuf] [MobSF:一款功能强大的智能移动安全框架](http://www.freebuf.com/articles/terminal/141439.html)
- 2017.04 [n0where] [Mobile Security Framework: MobSF](https://n0where.net/mobile-security-framework-mobsf)
- 2017.01 [toolswatch] [Mobile Security Framework (MobSF) v0.9.3](http://www.toolswatch.org/2017/01/mobile-security-framework-mobsf-v0-9-3/)
- 2016.05 [toolswatch] [Mobile Security Framework (MobSF) v0.9.2](http://www.toolswatch.org/2016/05/mobile-security-framework-mobsf-v0-9-2/)
- 2016.03 [freebuf] [工具推荐:MobSF,一款开源移动安全测试框架](http://www.freebuf.com/sectool/99475.html)

***

## androl4b

### 工具

- [**822**星][6m] [sh4hin/androl4b](https://github.com/sh4hin/androl4b) 用于评估Android应用程序,逆向工程和恶意软件分析的虚拟机

### 文章

- 2016.09 [n0where] [Android Security Virtual Machine: Androl4b](https://n0where.net/android-security-virtual-machine-androl4b)
- 2016.08 [freebuf] [【经验】使用Androl4b进行安卓APP安全测试(Part 1)](http://www.freebuf.com/articles/terminal/110374.html)
- 2016.07 [cn0xroot] [使用Androl4b进行安卓APP安全测试(Part 1)](https://cn0xroot.com/2016/07/29/how-to-testing-android-application-security/)
- 2016.02 [freebuf] [工具推荐:Androl4b,安卓安全评估测试利器](http://www.freebuf.com/sectool/95243.html)

***

## decaf

### 工具

- [**535**星][1m] [C] [decaf-project/decaf](https://github.com/decaf-project/DECAF) a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.
- [**26**星][3m] [Java] [decaf-lang/decaf](https://github.com/decaf-lang/decaf) The new Decaf compiler, rewritten in "modern" Java
- [**22**星][3m] [Rust] [decaf-lang/decaf-rs](https://github.com/decaf-lang/decaf-rs) The Decaf compiler, written in Rust

### 文章

- 2019.11 [freebuf] [DECAF:一款基于QEMU的二进制代码分析平台](https://www.freebuf.com/sectool/216773.html)
- 2015.11 [securitygossip] [DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps](http://securitygossip.com/blog/2015/11/18/2015-11-18/)
- 2015.11 [sjtu] [DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps](https://loccs.sjtu.edu.cn/gossip/blog/2015/11/18/2015-11-18/)
- 2009.12 [sans] [Anti-forensics, COFEE vs. DECAF](https://isc.sans.edu/forums/diary/Antiforensics+COFEE+vs+DECAF/7741/)

***

## cuckoo-droid

### 工具

- [**465**星][3y] [Py] [idanr1986/cuckoo-droid](https://github.com/idanr1986/cuckoo-droid) Automated Android Malware Analysis with Cuckoo Sandbox.

# 各类App

***

## ahmyth

### 工具

- [**1815**星][9m] [Smali] [ahmyth/ahmyth-android-rat](https://github.com/ahmyth/ahmyth-android-rat) Android Remote Administration Tool

### 文章

- 2018.10 [cybrary] [“I smell a rat!” – AhMyth, not a Myth](https://www.cybrary.it/2018/10/ahmyth-not-myth/)
- 2017.08 [n0where] [Android Remote Administration Tool: AhMyth](https://n0where.net/android-remote-administration-tool-ahmyth)
- 2017.07 [pentestingexperts] [Hacking Android Smart Phone Using AhMyth Android RAT](http://www.pentestingexperts.com/hacking-android-smart-phone-using-ahmyth-android-rat/)

***

## 工具

- [**28657**星][1m] [Kotlin] [shadowsocks/shadowsocks-android](https://github.com/shadowsocks/shadowsocks-android) A shadowsocks client for Android
- [**12463**星][1m] [Java] [signalapp/signal-android](https://github.com/signalapp/Signal-Android) A private messenger for Android.
- [**12463**星][1m] [Java] [signalapp/signal-android](https://github.com/signalapp/Signal-Android) A private messenger for Android.
- [**6106**星][3y] [shadowsocksrr/shadowsocksr-android](https://github.com/shadowsocksrr/shadowsocksr-android) A ShadowsocksR client for Android
- [**3210**星][3y] [shadowsocksr-backup/shadowsocksr-android](https://github.com/shadowsocksr-backup/shadowsocksr-android) A ShadowsocksR client for Android
- [**1007**星][7m] [Kotlin] [eycorsican/kitsunebi-android](https://github.com/eycorsican/kitsunebi-android) A fully-featured V2Ray client for Android.
- [**600**星][4m] [Kotlin] [hmbsbige/shadowsocksr-android](https://github.com/hmbsbige/shadowsocksr-android) A ShadowsocksR client for Android, written in Kotlin.
- [**536**星][2m] [Java] [dawei101/shadowsocks-android-java](https://github.com/dawei101/shadowsocks-android-java) Shadowsocks android client, pure java version

# Topic

***

## 漏洞

### 工具

- [**2164**星][12m] [Py] [linkedin/qark](https://github.com/linkedin/qark) 查找Android App的漏洞, 支持源码或APK文件
- [**968**星][3y] [Java] [androidvts/android-vts](https://github.com/AndroidVTS/android-vts) Android Vulnerability Test Suite - In the spirit of open data collection, and with the help of the community, let's take a pulse on the state of Android security. NowSecure presents an on-device app to test for recent device vulnerabilities.
- [**816**星][2y] [C] [timwr/cve-2016-5195](https://github.com/timwr/cve-2016-5195) CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android
- [**737**星][4y] [Py] [androbugs/androbugs_framework](https://github.com/androbugs/androbugs_framework) AndroBugs Framework is an efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. No need to install on Windows.
- [**607**星][1y] [C] [scottybauer/android_kernel_cve_pocs](https://github.com/scottybauer/android_kernel_cve_pocs) A list of my CVE's with POCs
- [**528**星][3m] [C] [jiayy/android_vuln_poc-exp](https://github.com/jiayy/android_vuln_poc-exp) This project contains pocs and exploits for vulneribilities I found (mostly)
- [**486**星][2y] [Py] [armissecurity/blueborne](https://github.com/armissecurity/blueborne) PoC scripts demonstrating the BlueBorne vulnerabilities
- [**413**星][2y] [Py] [ojasookert/cve-2017-0785](https://github.com/ojasookert/cve-2017-0785) Blueborne CVE-2017-0785 Android information leak vulnerability
- [**408**星][2y] [C] [fuzion24/androidkernelexploitationplayground](https://github.com/fuzion24/androidkernelexploitationplayground) a hands on guide to Linux kernel exploitation with a special interest in Android
- [**389**星][2y] [Java] [davidbuchanan314/nxloader](https://github.com/davidbuchanan314/nxloader) My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)
- [**344**星][2y] [C++] [ele7enxxh/poc-exp](https://github.com/ele7enxxh/poc-exp) 某些 Android 漏洞的poc/exp
- [**333**星][3y] [Java] [seven456/safewebview](https://github.com/seven456/safewebview) Android Safe WebView、解决WebView的Js对象注入漏洞、支持网页将JS函数(function)传到Java层,方便回调;
- [**294**星][11m] [C] [tangsilian/android-vuln](https://github.com/tangsilian/android-vuln) 安卓内核提权漏洞分析
- [**260**星][1y] [C] [chef-koch/android-vulnerabilities-overview](https://github.com/chef-koch/android-vulnerabilities-overview) An small overview of known Android vulnerabilities
- [**244**星][1m] [C] [grant-h/qu1ckr00t](https://github.com/grant-h/qu1ckr00t) A PoC application demonstrating the power of an Android kernel arbitrary R/W.
- [**243**星][3y] [C] [hyln9/vikiroot](https://github.com/hyln9/vikiroot) CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow
- [**240**星][1y] [Ruby] [hahwul/droid-hunter](https://github.com/hahwul/droid-hunter) (deprecated) Android application vulnerability analysis and Android pentest tool
- [**167**星][1y] [C] [jioundai/bluedroid](https://github.com/jioundai/bluedroid) PoCs of Vulnerabilities on Bluedroid
- [**167**星][2y] [JS] [logicalhacking/dvhma](https://github.com/logicalhacking/dvhma) Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.
- [**160**星][4y] [Py] [appknox/afe](https://github.com/appknox/AFE) Android Framework for Exploitation, is a framework for exploiting android based devices
- [**142**星][5m] [HTML] [sundaysec/android-exploits](https://github.com/sundaysec/android-exploits) A collection of android Exploits and Hacks
- [**141**星][5y] [Java] [retme7/cve-2014-7911_poc](https://github.com/retme7/cve-2014-7911_poc) Local root exploit for Nexus5 Android 4.4.4(KTU84P)
- [**135**星][3y] [C] [jcadduono/android_external_dirtycow](https://github.com/jcadduono/android_external_dirtycow) CVE-2016-5195 (dirtycow/dirtyc0w) - recowvery fork
- [**131**星][6y] [Java] [fuzion24/androidziparbitrage](https://github.com/fuzion24/androidziparbitrage) Exploit for Android Zip bugs: 8219321, 9695860, and 9950697
- [**129**星][2y] [C] [smeso/mtpwn](https://github.com/smeso/mtpwn) PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)
- [**127**星][4y] [C] [fi01/cve-2015-3636](https://github.com/fi01/cve-2015-3636) PoC code for 32 bit Android OS
- [**103**星][1y] [Java] [duo-labs/xray](https://github.com/duo-labs/xray) X-Ray allows you to scan your Android device for security vulnerabilities that put your device at risk.
- [**97**星][2y] [C] [secwiki/android-kernel-exploits](https://github.com/secwiki/android-kernel-exploits) android kernel exploits漏洞集合
- [**95**星][1y] [Py] [integrity-sa/droidstatx](https://github.com/integrity-sa/droidstatx) Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via static analysis. The map itself is an Android Application Pentesting Methodology component, which assists Pentesters to cover all important areas during an assessment.
- [**89**星][5y] [C] [retme7/cve-2014-4322_poc](https://github.com/retme7/cve-2014-4322_poc) Gain privileges:system -> root,as a part of
- [**84**星][10m] [C] [nowsecure/dirtycow](https://github.com/nowsecure/dirtycow) radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability
- [**81**星][3y] [C] [derrekr/android_security](https://github.com/derrekr/android_security) Public Android Vulnerability Information (CVE PoCs etc)
- [**76**星][4y] [C] [viralsecuritygroup/knoxout](https://github.com/viralsecuritygroup/knoxout) A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.
- [**70**星][4y] [C++] [laginimaineb/cve-2014-7920-7921](https://github.com/laginimaineb/cve-2014-7920-7921) Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1
- [**69**星][2y] [Py] [odensc/janus](https://github.com/odensc/janus) Python script to create an Android APK exploiting the Janus vulnerability.
- [**67**星][6y] [C++] [trevd/android_root](https://github.com/trevd/android_root) Got Root!
- [**65**星][2y] [Py] [ojasookert/cve-2017-0781](https://github.com/ojasookert/cve-2017-0781) Blueborne CVE-2017-0781 Android heap overflow vulnerability
- [**47**星][3y] [silvermoonsecurity/security-misc](https://github.com/silvermoonsecurity/security-misc) # Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS and so forath) and popular applicaiton
- [**46**星][4m] [Java] [flankerhqd/vendor-android-cves](https://github.com/flankerhqd/vendor-android-cves) Collections of my POCs for android vendor CVEs
- [**46**星][2m] [Java] [flankerhqd/vendor-android-cves](https://github.com/flankerhqd/vendor-android-cves) Collections of my POCs for android vendor CVEs
- [**43**星][2y] [Shell] [xtiankisutsa/twiga](https://github.com/xtiankisutsa/twiga) 枚举 Android 设备,获取了解其内部部件和漏洞利用的信息
- [**39**星][3y] [Py] [programa-stic/marvin-dynamic-analyzer](https://github.com/programa-stic/marvin-dynamic-analyzer) Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.
- [**39**星][2y] [Py] [sundaysec/andspoilt](https://github.com/sundaysec/andspoilt) Run interactive android exploits in linux.
- [**38**星][3m] [C] [arinerron/cve-2016-5195](https://github.com/arinerron/cve-2016-5195) Automated Android root via CVE-2016-5195 (dirtycow/dirtyc0w PoC)
- [**37**星][2y] [Java] [htbridge/pivaa](https://github.com/htbridge/pivaa) Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of mobile vulnerability scanners.
- [**36**星][7m] [Py] [raymanfx/android-cve-checker](https://github.com/raymanfx/android-cve-checker) Python tool to check your Android kernel for missing CVE patches.
- [**33**星][6m] [Py] [monolithworks/trueseeing](https://github.com/monolithworks/trueseeing) Non-decompiling Android vulnerability scanner (DC25 demo lab, CB17)
- [**32**星][5y] [Ruby] [jduck/addjsif](https://github.com/jduck/addjsif) Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)
- [**26**星][4m] [Py] [alfa100001/-cve-2017-0785-blueborne-poc](https://github.com/alfa100001/-cve-2017-0785-blueborne-poc) CVE-2017-0785 BlueBorne PoC
- [**25**星][1m] [b3nac/injuredandroid](https://github.com/b3nac/injuredandroid) A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
- [**24**星][3y] [C] [davidbuchanan314/cowroot](https://github.com/davidbuchanan314/cowroot) Universal Android root tool based on CVE-2016-5195. Watch this space.
- [**22**星][3y] [C] [sagi/android_pocs](https://github.com/sagi/android_pocs) Android Vulnerability Reports and POCs.
- [**19**星][1m] [Java] [ivan-markovic/android-task-injection](https://github.com/ivan-markovic/android-task-injection) Task Hijacking in Android (somebody call it also StrandHogg vulnerability)
- [**18**星][3y] [C] [freddierice/farm-root](https://github.com/freddierice/farm-root) Farm root is a root for android devices using the dirty cow vulnerability
- [**18**星][1y] [C++] [tamirzb/cve-2018-9539](https://github.com/tamirzb/cve-2018-9539) PoC code for CVE-2018-9539
- [**15**星][7y] [C] [hiikezoe/libperf_event_exploit](https://github.com/hiikezoe/libperf_event_exploit) CVE-2013-2094 exploit for android
- [**15**星][3y] [Java] [tanprathan/sievepwn](https://github.com/tanprathan/sievepwn) An android application which exploits sieve through android components.
- [**13**星][3y] [C] [a7vinx/cve-2015-3636](https://github.com/a7vinx/cve-2015-3636) Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.
- [**13**星][5y] [Perl] [irsl/lgosp-poc](https://github.com/irsl/lgosp-poc) LG On Screen Phone authentication bypass PoC (CVE-2014-8757)
- [**13**星][6y] [Shell] [k3170makan/droidsploit](https://github.com/k3170makan/droidsploit) A collection of scripts to find common application vulnerabilities in Android Applications
- [**11**星][4y] [Java] [geneblue/cve-2014-7911-exp](https://github.com/geneblue/cve-2014-7911-exp) exploit for cve-2014-7911; android; java deserialization ;system privilege;ace;
- [**11**星][2m] [Java] [ioactive/aosp-downloadproviderhijacker](https://github.com/ioactive/aosp-downloadproviderhijacker) PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)
- [**10**星][3y] [C] [m-mullins/cve-2016-8655_android](https://github.com/m-mullins/cve-2016-8655_android) Android attempt at PoC CVE-2016-8655
- [**9**星][5y] [C] [ele7enxxh/fakeodex](https://github.com/ele7enxxh/fakeodex) modify field(modWhen, crc) in android odex file;安卓APP“寄生兽”漏洞
- [**9**星][4y] [Java] [heeeeen/cve-2014-7911poc](https://github.com/heeeeen/cve-2014-7911poc)
- [**9**星][2y] [Java] [lanrat/tethr](https://github.com/lanrat/tethr) Android Tethering Provisioning Check Bypass (CVE-2017-0554)
- [**8**星][3y] [C] [timwr/cve-2013-6282](https://github.com/timwr/cve-2013-6282) CVE-2013-6282 proof of concept for Android
- [**8**星][2m] [C++] [amrashraf/androshield](https://github.com/amrashraf/androshield) An ASP.NET web application that responsible of detecting and reporting vulnerabilities in android applications by static and dynamic analysis methodologies.
- [**6**星][3y] [Java] [ele7enxxh/cve-2014-7911](https://github.com/ele7enxxh/cve-2014-7911)
- [**6**星][2m] [Java] [ioactive/aosp-downloadproviderdbdumper](https://github.com/ioactive/aosp-downloadproviderdbdumper) PoC Exploiting SQL Injection in Android's Download Provider (CVE-2018-9493)
- [**6**星][2m] [Java] [ioactive/aosp-downloadproviderheadersdumper](https://github.com/ioactive/aosp-downloadproviderheadersdumper) PoC Exploiting Headers Disclosure in Android's Download Provider (CVE-2018-9546)
- [**6**星][2y] [Java] [michalbednarski/reparcelbug](https://github.com/michalbednarski/reparcelbug) CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)
- [**5**星][6y] [PHP] [thomascannon/android-cve-2010-4804](https://github.com/thomascannon/android-cve-2010-4804) Android Data Stealing Vulnerability
- [**3**星][1y] [Java] [alexeyzatsepin/cp-tester](https://github.com/alexeyzatsepin/cp-tester) Android application for finding vulnerabilities in all of content providers based on SQLite databases on your device with sql-injection
- [**3**星][7y] [C] [hiikezoe/libfb_mem_exploit](https://github.com/hiikezoe/libfb_mem_exploit) CVE-2013-2596 exploit for android
- [**3**星][6y] [Py] [niejuhu/pocs](https://github.com/niejuhu/pocs) Android漏洞验证程序
- [**2**星][3y] [Py] [kr1shn4murt1/exploit-ms-17-010](https://github.com/kr1shn4murt1/exploit-ms-17-010) Exploit para vulnerabilidad ms17-010 desde android
- [**2**星][6y] [yangwenbo/resetpin](https://github.com/yangwenbo/resetpin) POC of Android Fragment Injection vulnerability, about reset PIN
- [**1**星][3m] [Py] [brant-ruan/idf4apev](https://github.com/brant-ruan/idf4apev) Integrated Detection Framework for Android's Privilege Escalation Vulnerabilites

### 文章

- 2020.02 [venus] [Android 蓝牙子系统 "BlueFrag" 漏洞分析(CVE-2020-0022)](https://paper.seebug.org/1121/)
- 2020.02 [nsfocus] [【威胁通告】安卓蓝牙组件高危漏洞(CVE-2020-0022)](http://blog.nsfocus.net/cve-2020-0022/)
- 2020.02 [insinuator] [Critical Bluetooth Vulnerability in Android (CVE-2020-0022)](https://insinuator.net/2020/02/critical-bluetooth-vulnerability-in-android-cve-2020-0022/)
- 2020.01 [LoiLiangYang] [Hack Facebook Account on Android with Browser Exploitation Framework (Cybersecurity)](https://www.youtube.com/watch?v=HIYcqZqqpS4)
- 2019.12 [aliyun] [Android内核漏洞学习——CVE-2014-3153分析(2)](https://xz.aliyun.com/t/6948)
- 2019.12 [4hou] [谷歌修复CVE-2019-2232安卓DoS漏洞](https://www.4hou.com/vulnerable/22055.html)
- 2019.12 [pangu] [盘古实验室报告两个Android安全漏洞获Google致谢](https://blog.pangu.io/?p=66)
- 2019.12 [aliyun] [Android内核漏洞学习——CVE-2014-3153分析(1)](https://xz.aliyun.com/t/6907)
- 2019.12 [HackersOnBoard] [DEF CON 27 - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors](https://www.youtube.com/watch?v=9PYYnl0FR1I)
- 2019.12 [4hou] [StrandHogg安卓漏洞分析](https://www.4hou.com/vulnerable/21903.html)
- 2019.12 [aliyun] [CVE-2019-2215—android内核binder漏洞分析(2)](https://xz.aliyun.com/t/6853)
- 2019.11 [secplicity] [Android Screen Capture Vulnerabilities](https://www.secplicity.org/2019/11/25/android-screen-capture-vulnerabilities/)
- 2019.11 [lookout] [Strandhogg vulnerability allows attackers to circumvent Android OS safeguards](https://blog.lookout.com/strandhogg-vulnerability-allows-attackers-to-circumvent-android-os-safeguards)
- 2019.11 [googleprojectzero] [Bad Binder: Android In-The-Wild Exploit](https://googleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html)
- 2019.11 [freebuf] [谷歌三星安卓摄像头应用含高危漏洞变身监控器,影响数亿设备(PoC)](https://www.freebuf.com/vuls/220644.html)
- 2019.11 [aliyun] [Android内核漏洞——初探](https://xz.aliyun.com/t/6715)
- 2019.11 [secplicity] [Android Vulnerability: NFC and Android Beam](https://www.secplicity.org/2019/11/06/android-vulnerability-nfc-and-android-beam/)
- 2019.11 [riusksk] [Android应用逻辑漏洞半自动化挖掘思路](http://riusksk.me/2019/11/02/Jandroid:半自动化Android应用逻辑漏洞挖掘/)
- 2019.10 [nightwatchcybersecurity] [NFC Beaming Bypasses Security Controls in Android [CVE-2019-2114]](https://wwws.nightwatchcybersecurity.com/2019/10/24/nfc-beaming-bypasses-security-controls-in-android-cve-2019-2114/)
- 2019.10 [4hou] [利用 Android WhatsApp App GIF 库的 Double-Free 漏洞实现 RCE](https://www.4hou.com/vulnerable/21137.html)
- 2019.10 [Sophos] [Android zero-day exploit - what you need know - Naked Security Live](https://www.youtube.com/watch?v=oZVyQiSEKko)
- 2019.10 [4hou] [Android Binder Driver UAF 漏洞实现 Root 提权分析(CVE-2019-2215)](https://www.4hou.com/info/news/21060.html)
- 2019.10 [Sophos] [Android zero-day exploit: what you need know - Naked Security Live](https://www.youtube.com/watch?v=6QNIQxpGd9U)
- 2019.10 [venus] [Examining and exploiting Android vendor binder services:谁偷了我的虚表?](https://paper.seebug.org/1051/)
- 2019.10 [trendmicro] [This Week in Security News: How a GIF Can Hack Your Android and Vulnerabilities That Could Put Hospital Networks at Risk](https://blog.trendmicro.com/this-week-in-security-news-how-a-gif-can-hack-your-android-and-vulnerabilities-that-could-put-hospital-networks-at-risk/)
- 2019.09 [LoiLiangYang] [Android Mobile Device Post Exploitation (Cyber-Security)](https://www.youtube.com/watch?v=ubxtIwJXKmk)
- 2019.09 [PositiveTechnologies] [Underestimated vulnerabilities of modern Android applications](https://www.youtube.com/watch?v=LrshHwrZMcU)
- 2019.09 [t00ls] [安卓应用漏洞挖掘分享-Ayound](https://www.t00ls.net/articles-52920.html)
- 2019.09 [secplicity] [Unpatched 0-Day Android Vulnerability](https://www.secplicity.org/2019/09/14/unpatched-0-day-android-vulnerability/)
- 2019.09 [4hou] [6个月没有补丁的Android 0 day权限提升漏洞](https://www.4hou.com/info/news/20186.html)
- 2019.09 [aliyun] [CVE-2017-13253 :Android Drm服务 堆溢出漏洞](https://xz.aliyun.com/t/6144)
- 2019.08 [freebuf] [挖洞经验 | 发现Outlook安卓版本APP跨站漏洞CVE-2019-1105](https://www.freebuf.com/vuls/211091.html)
- 2019.08 [aliyun] [CVE-2018-9539:特权Android服务中的Use-After-Free](https://xz.aliyun.com/t/5833)
- 2019.07 [freebuf] [Android出现新漏洞,可在无权限的情况下利用传感器获取语音信息](https://www.freebuf.com/news/208700.html)
- 2019.07 [freebuf] [挖洞经验 | 看我如何发现微软Outlook for Android移动应用的XSS漏洞](https://www.freebuf.com/vuls/208038.html)
- 2019.07 [lightbluetouchpaper] [The lifetime of an Android API vulnerability](https://www.lightbluetouchpaper.org/2019/07/10/the-lifetime-of-an-android-api-vulnerability/)
- 2019.06 [JosephDelgadillo] [Learn System Hacking E20: Exploiting Android and iOS Devices with Venom](https://www.youtube.com/watch?v=mRSJeh7EyOQ)
- 2019.06 [antid0te] [ARM64 Reverse Engineering and Android/Linux Exploitation Training (October 2019)](http://antid0te.com/blog/19-10-07-arm64-reverse-engineering-exploitation-singapore.html)
- 2019.06 [knownsec404team] [Linux Kernel: the ROP Exploit of Stack Overflow in Android Kernel](https://medium.com/p/87aa8eda770d)
- 2019.06 [venus] [Linux Kernel: the ROP Exploit of Stack Overflow in Android Kernel](https://paper.seebug.org/947/)
- 2019.05 [4hou] [Android和iOS设备的指纹识别技术漏洞曝光,该漏洞几乎不可控!](https://www.4hou.com/vulnerable/18210.html)
- 2019.05 [arxiv] [[1905.09352] Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities](https://arxiv.org/abs/1905.09352)
- 2019.05 [quarkslab] [Android Application Diffing: CVE-2019-10875 Inspection](https://blog.quarkslab.com/android-application-diffing-cve-2019-10875-inspection.html)
- 2019.04 [ioactive] [Multiple Vulnerabilities in Android’s Download Provider (CVE-2018-9468, CVE-2018-9493, CVE-2018-9546)](https://ioactive.com/multiple-vulnerabilities-in-androids-download-provider-cve-2018-9468-cve-2018-9493-cve-2018-9546/)
- 2019.03 [aliyun] [CVE-2019-2000—android内核binder中fdget优化产生的UAF漏洞的分析](https://xz.aliyun.com/t/4494)
- 2019.03 [int0x33] [Day 82: Hunting for Vulnerabilities in Android Apps with Burp and APK Tools](https://medium.com/p/8b84bc189603)
- 2019.03 [arxiv] [[1903.05170] BenchPress: Analyzing Android App Vulnerability Benchmark Suites](https://arxiv.org/abs/1903.05170)
- 2019.03 [MastersInEthicalHacking] [Vulnerability Scanning Using Android](https://www.youtube.com/watch?v=3uk11wrbJLQ)
- 2019.03 [aliyun] [简单的安卓漏洞挖掘(二)](https://xz.aliyun.com/t/4269)
- 2019.03 [] [The ‘Waterdrop’ in Android: A Binder Kernel Vulnerability](http://blogs.360.cn/post/Binder_Kernel_Vul_EN.html)
- 2019.03 [NullByte] [Scan Websites for Vulnerabilities using Kali Linux on Any Android Device [Tutorial]](https://www.youtube.com/watch?v=TCj645oL0wo)
- 2019.03 [freebuf] [如何使用未Root的Android手机扫描网站漏洞](https://www.freebuf.com/sectool/196167.html)
- 2019.02 [googleblog] [Android Security Improvement update: Helping developers harden their apps, one thwarted vulnerability at a time](https://android-developers.googleblog.com/2019/02/android-security-improvement-update.html)
- 2019.02 [aliyun] [简单的安卓漏洞挖掘学习(一)](https://xz.aliyun.com/t/4197)
- 2019.02 [talosintelligence] [Rakuten Viber Android Secret Chats Information Disclosure Vulnerability](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0655)
- 2019.01 [securitygossip] [Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities](https://securitygossip.com/blog/2019/01/16/dazed-droids-a-longitudinal-study-of-android-inter-app-vulnerabilities/)
- 2019.01 [sjtu] [Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities](https://loccs.sjtu.edu.cn/gossip/blog/2019/01/16/dazed-droids-a-longitudinal-study-of-android-inter-app-vulnerabilities/)
- 2019.01 [vulnerability0lab] [Microsoft Skype v8.34 Android Consumer Version - Authentication Bypass Vulnerability CVE-2019-0622](https://www.youtube.com/watch?v=2AUxh2M1EPg)
- 2018.12 [talosintelligence] [Telegram Android Secret Chats Information Disclosure Vulnerability](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0654)
- 2018.12 [pediy] [[原创](Android Root)CVE-2017-7533 漏洞分析和复现](https://bbs.pediy.com/thread-248481.htm)
- 2018.12 [talosintelligence] [Signal Messenger Android self deleting messages Information Disclosure Vulnerability](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0656)
- 2018.11 [4hou] [Android系统中通过RSSI广播泄漏敏感数据的漏洞详情披露(CVE-2018-9581)](http://www.4hou.com/vulnerable/14657.html)
- 2018.11 [nightwatchcybersecurity] [Sensitive Data Exposure via RSSI Broadcasts in Android OS [CVE-2018-9581]](https://wwws.nightwatchcybersecurity.com/2018/11/11/cve-2018-9581/)
- 2018.11 [nightwatchcybersecurity] [Android系统电池信息广播可泄漏敏感数据(CVE-2018-15835)](https://wwws.nightwatchcybersecurity.com/2018/11/11/cve-2018-15835/)
- 2018.11 [4hou] [影响Android多个高权限服务的严重漏洞详情披露(CVE-2018-9411)](http://www.4hou.com/vulnerable/14456.html)
- 2018.11 [zimperium] [CVE-2018-9539: Use-after-free vulnerability in privileged Android service](https://blog.zimperium.com/cve-2018-9539-use-free-vulnerability-privileged-android-service/)
- 2018.11 [aliyun] [CVE-2018-9411:多个高权限Android服务中的新关键漏洞](https://xz.aliyun.com/t/3164)
- 2018.10 [pediy] [[翻译]Android 8.1 默认打印服务的中间人攻击漏洞披露](https://bbs.pediy.com/thread-247566.htm)
- 2018.10 [zimperium] [CVE-2018-9411: 多个高权限的Android服务的严重漏洞](https://blog.zimperium.com/cve-2018-9411-new-critical-vulnerability-multiple-high-privileged-android-services/)
- 2018.09 [NorthSec] [Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development](https://www.youtube.com/watch?v=S0a3EtlB824)
- 2018.09 [4hou] [完美越狱iOS12后 阿里安全潘多拉实验室再曝Linux存严重漏洞:9成安卓手机可被控制](http://www.4hou.com/info/news/13752.html)
- 2018.09 [4hou] [Facebook安卓应用任意Javascript代码执行漏洞详情披露](http://www.4hou.com/vulnerable/13645.html)
- 2018.09 [aliyun] [Android OS 中通过 WiFi 广播泄漏敏感数据(CVE-2018-9489)](https://xz.aliyun.com/t/2751)
- 2018.09 [360] [Facebook安卓客户端任意Javascript代码执行漏洞分析](https://www.anquanke.com/post/id/159648/)
- 2018.09 [googleprojectzero] [OATmeal on the Universal Cereal Bus: Exploiting Android phones over USB](https://googleprojectzero.blogspot.com/2018/09/oatmeal-on-universal-cereal-bus.html)
- 2018.09 [4hou] [故意为之?安卓9.0以前的全部系统版本均受到“API-breaking”漏洞的影响](http://www.4hou.com/vulnerable/13460.html)
- 2018.08 [nightwatchcybersecurity] [Sensitive Data Exposure via WiFi Broadcasts in Android OS [CVE-2018-9489]](https://wwws.nightwatchcybersecurity.com/2018/08/29/sensitive-data-exposure-via-wifi-broadcasts-in-android-os-cve-2018-9489/)
- 2018.08 [venus] [Android 蓝牙组件漏洞连连看](https://paper.seebug.org/666/)
- 2018.08 [CPP] [Android Operating System: One Potential Vulnerability per 4000 Lines of C++ Code](https://medium.com/p/85041585927b)
- 2018.08 [360] [Android用户字典侧信道信息泄露漏洞(CVE-2018-9375)](https://www.anquanke.com/post/id/154267/)
- 2018.08 [ioactive] [Discovering and Exploiting a Vulnerability in Android’s Personal Dictionary (CVE-2018-9375)](https://ioactive.com/discovering-and-exploiting-a-vulnerability-in-androids-personal-dictionary/)
- 2018.07 [4hou] [Quarkslab发现的三个Android蓝牙组件漏洞详情](http://www.4hou.com/vulnerable/12810.html)
- 2018.07 [arxiv] [[1807.11840] Open Source Android Vulnerability Detection Tools: A Survey](https://arxiv.org/abs/1807.11840)
- 2018.07 [pediy] [[原创]CVE-2015-3636(pingpong root) android内核 UAF漏洞分析](https://bbs.pediy.com/thread-230298.htm)
- 2018.07 [quarkslab] [A Story About Three Bluetooth Vulnerabilities in Android](https://blog.quarkslab.com/a-story-about-three-bluetooth-vulnerabilities-in-android.html)
- 2018.07 [360] [RAMpage攻击:再次利用安卓RowHammer漏洞](https://www.anquanke.com/post/id/150881/)
- 2018.07 [hackers] [Metasploit Basics, Part 13: Exploiting Android Mobile Devices](https://www.hackers-arise.com/single-post/2018/07/06/Metasploit-Basics-Part-13-Exploiting-Android-Mobile-Devices)
- 2018.07 [4hou] [RAMpage攻击:再次利用安卓DRAM RowHammer漏洞](http://www.4hou.com/vulnerable/12343.html)
- 2018.07 [ms509] [Bundle风水——Android序列化与反序列化不匹配漏洞详解](http://www.ms509.com/2018/07/03/bundle-mismatch/)
- 2018.06 [qq] [【游戏漏洞】简单破解安卓手游基础](http://gslab.qq.com/article-512-1.html)
- 2018.06 [zimperium] [RAMpage: The Latest Rowhammer-esque Android Vulnerability](https://blog.zimperium.com/rampage-latest-rowhammer-esque-android-vulnerability/)
- 2018.06 [arxiv] [[1806.09059] Are Free Android App Security Analysis Tools Effective in Detecting Known Vulnerabilities?](https://arxiv.org/abs/1806.09059)
- 2018.06 [freebuf] [APP漏洞赏金项目之安卓APP应用程序测试(一)](http://www.freebuf.com/articles/terminal/174483.html)
- 2018.06 [NetworkHeros] [Hack with zANTI Vulnerability Assessment & MITM (Android Hacking) #Part-II](https://www.youtube.com/watch?v=aGVIRbTeQAs)
- 2018.06 [NetworkHeros] [Hack with zANTI 3.18 : Vulnerability Assessment & MITM (Android Hacking) #Part-1](https://www.youtube.com/watch?v=Xl3rgXEwbp8)
- 2018.05 [aliyun] [Bundle风水——Android序列化与反序列化不匹配漏洞详解](https://xz.aliyun.com/t/2364)
- 2018.05 [nightwatchcybersecurity] [Android OS Didn’t use FLAG_SECURE for Sensitive Settings [CVE-2017-13243]](https://wwws.nightwatchcybersecurity.com/2018/05/24/android-os-didnt-use-flag_secure-for-sensitive-settings-cve-2017-13243/)
- 2018.05 [HackerSploit] [Android Hacking With zANTI - MITM & Vulnerability Assessment](https://www.youtube.com/watch?v=_P4Q__ZSFUo)
- 2018.05 [360] [DEFCON CHINA议题解读 | 通用安卓平台路径穿越漏洞的挖掘与利用](https://www.anquanke.com/post/id/145005/)
- 2018.05 [freebuf] [安卓、iOS双平台现重大安全漏洞,微博、网易云音乐等大型应用均受影响](http://www.freebuf.com/news/171914.html)
- 2018.05 [pentestingexperts] [How to Hack Android Devices Using the StageFright Vulnerability](http://www.pentestingexperts.com/how-to-hack-android-devices-using-the-stagefright-vulnerability/)
- 2018.04 [360] [Android内核漏洞调试:编译android4.4.4源码和内核](https://www.anquanke.com/post/id/105994/)
- 2018.04 [layerone] [Training Spotlight: Android Reverse Engineering for Bug Bounties and Vulnerability Hunting](https://www.layerone.org/training-spotlight-android-reverse-engineering-for-bug-bounties-and-vulnerability-hunting/)
- 2018.04 [pediy] [[原创]CVE-2017-13258 Android 蓝牙BNEP漏洞分析](https://bbs.pediy.com/thread-226004.htm)
- 2018.03 [pediy] [[分享]CVE-2017-13253 Android Drm服务 堆溢出漏洞调试分析](https://bbs.pediy.com/thread-225398.htm)
- 2018.03 [quarkslab] [2018年3月安全公告中的Android蓝牙漏洞详情](https://blog.quarkslab.com/android-bluetooth-vulnerabilities-in-the-march-2018-security-bulletin.html)
- 2018.03 [360] [CVE-2017-13253:多个Android DRM服务中存在缓冲区溢出漏洞](https://www.anquanke.com/post/id/101552/)
- 2018.03 [zimperium] [Android DRM服务缓冲区溢出漏洞(CVE-2017-13253)](https://blog.zimperium.com/cve-2017-13253-buffer-overflow-multiple-android-drm-services/)
- 2018.03 [NDSSSymposium] [NDSS2018 - Automated Generation of Event-Oriented Exploits in Android Hybrid Apps](https://www.youtube.com/watch?v=O73Lua_McO0)
- 2018.03 [infosecinstitute] [How to Hack Android Devices Using the StageFright Vulnerability](http://resources.infosecinstitute.com/hack-android-devices-using-stagefright-vulnerability/)
- 2018.03 [TechnicalMujeeb] [how to find android apps vulnerabilities in Termux](https://www.youtube.com/watch?v=td2wEobEzQ0)
- 2018.03 [freebuf] [安卓端渗透工具DVHMA:自带漏洞的混合模式APP](http://www.freebuf.com/news/163057.html)
- 2018.03 [nightwatchcybersecurity] [Content Injection in Samsung Display Solutions Application for Android [CVE-2018-6019]](https://wwws.nightwatchcybersecurity.com/2018/03/01/content-injection-in-samsung-display-solutions-application-for-android-cve-2018-6019/)
- 2018.02 [insinuator] [AndroTickler: Tickling Vulnerabilities out of Android Apps](https://insinuator.net/2018/02/androtickler-tickling-vulnerabilities-out-of-android-apps/)
- 2018.02 [HITCON] [[HITCON CMT 2017] R2D104 - 温瀚翔 & 王曉東 - Challenge Impossible -- Multiple Exploit On Android](https://www.youtube.com/watch?v=vld3_lxhK9w)
- 2018.01 [freebuf] [CVE-2017-8890漏洞分析与利用(Root Android 7.x)](http://www.freebuf.com/articles/terminal/160041.html)
- 2018.01 [qq] [【游戏漏洞】安卓手游逆向必须基础](http://gslab.qq.com/article-382-1.html)
- 2018.01 [freebuf] [关于Android平台WebView控件存在跨域高危漏洞的安全公告](http://www.freebuf.com/articles/terminal/159787.html)
- 2018.01 [attify] [Advanced Android and iOS Hands-on Exploitation training](https://blog.attify.com/advanced-android-and-ios-hands-on-exploitation-training/)
- 2018.01 [4hou] [Janus安卓应用签名绕过漏洞(CVE-2017-13156),允许攻击者修改合法应用](http://www.4hou.com/info/news/9536.html)
- 2018.01 [qq] [【游戏漏洞】安卓U3D逆向从Assembly-CSharp到il2cpp](http://gslab.qq.com/article-381-1.html)
- 2018.01 [retme] [The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel (slides)](http://retme.net/index.php/2018/01/02/unconventional-UAF-in-kernel.html)
- 2017.12 [360] [Tethr:安卓网络共享服务开通状态检查绕过漏洞(CVE-2017-0554)](https://www.anquanke.com/post/id/92780/)
- 2017.12 [lanrat] [Tethr: Android Tethering Provisioning Check Bypass (CVE-2017-0554)](https://lanrat.com/tethr/)
- 2017.12 [ms509] [Android蓝牙远程命令执行漏洞利用实践 exploit优化](http://www.ms509.com/2017/12/22/android-blueborne2/)
- 2017.12 [4hou] [CVE-2017-17551:Dolphin浏览器漏洞之利用安卓备份恢复特性](http://www.4hou.com/vulnerable/9373.html)
- 2017.12 [4hou] [安卓新漏洞:攻击者可任意修改App](http://www.4hou.com/info/news/9278.html)
- 2017.12 [360] [安卓系统Janus漏洞分析专题](https://www.anquanke.com/post/id/90395/)
- 2017.12 [freebuf] [独家分析:安卓“Janus”漏洞的产生原理及利用过程](http://www.freebuf.com/articles/terminal/156862.html)
- 2017.12 [360] [独家分析:安卓“Janus”漏洞的产生原理及利用过程](https://www.anquanke.com/post/id/90075/)
- 2017.12 [360] [ParseDroid漏洞:针对Android开发者和安全分析人员](https://www.anquanke.com/post/id/89557/)
- 2017.12 [esecurityplanet] [Google Patches Android for 47 Vulnerabilities in Final Update for 2017](https://www.esecurityplanet.com/mobile-security/google-patches-android-for-47-vulnerabilities-in-final-update-for-2017.html)
- 2017.11 [hackingarticles] [Android Mobile Exploitation with Evil-Droid](http://www.hackingarticles.in/android-mobile-exploitation-evil-droid/)
- 2017.11 [4hou] [一个漏洞泄露安卓用户的声音](http://www.4hou.com/info/news/8657.html)
- 2017.11 [freebuf] [Android Media Projection服务漏洞深度剖析](http://www.freebuf.com/articles/terminal/154704.html)
- 2017.11 [aliyun] [Android蓝牙远程命令执行漏洞利用实践: Exploit优化](https://xz.aliyun.com/t/1521)
- 2017.11 [4hou] [Android BlueBorne (CVE-2017-0781)漏洞分析和利用](http://www.4hou.com/mobile/8496.html)
- 2017.11 [TechnicalMujeeb] [A-RAt exploit Tool Remote Access Android using Termux App.](https://www.youtube.com/watch?v=bzYsfe6WT7M)
- 2017.11 [jesux] [Android 6.0.1 蓝牙RCE 漏洞 BlueBorne(CVE-2017-0781)](https://jesux.es/exploiting/blueborne-android-6.0.1-english/)
- 2017.11 [ms509] [Android蓝牙远程命令执行漏洞利用实践:从PoC到exploit](http://www.ms509.com/2017/11/14/blueborne/)
- 2017.11 [4hou] [11月安卓系统漏洞小结:31个不得不修复的漏洞](http://www.4hou.com/info/news/8374.html)
- 2017.11 [jesux] [BlueBorne RCE en Android 6.0.1 (CVE-2017-0781)](https://jesux.es/exploiting/blueborne-android-6.0.1/)
- 2017.10 [venus] [Android蓝牙远程命令执行漏洞利用实践:从PoC到Exploit](https://paper.seebug.org/430/)
- 2017.10 [aliyun] [Android蓝牙远程命令执行漏洞利用实践:从PoC到Exploit](https://xz.aliyun.com/t/6)
- 2017.10 [freebuf] [Google Play Store启动漏洞赏金计划保护Android应用](http://www.freebuf.com/news/151363.html)
- 2017.10 [armis] [BlueBorne on Android: Exploiting an RCE Over the Air](https://www.armis.com/blueborne-on-android-exploiting-rce-over-the-air/)
- 2017.09 [esecurityplanet] [Google Android and Apple iOS Update for Critical Wi-Fi Vulnerabilities](https://www.esecurityplanet.com/mobile-security/google-android-and-apple-ios-update-for-critical-wi-fi-vulnerabilities.html)
- 2017.09 [360] [ZNIU:首款利用Dirty COW漏洞的Android恶意软件](https://www.anquanke.com/post/id/86930/)
- 2017.09 [freebuf] [Android Message APP 拒绝服务漏洞(CVE-2017-0780)分析与利用](http://www.freebuf.com/vuls/147601.html)
- 2017.09 [360] [CVE-2017-0780:拒绝服务漏洞可以导致Android信息应用崩溃](https://www.anquanke.com/post/id/86863/)
- 2017.09 [pediy] [[原创] Android内核提权cve-2014-3153研究笔记](https://bbs.pediy.com/thread-221235.htm)
- 2017.09 [4hou] [CVE-2017-0780:一张GIF图,让最新版Android短信应用无限崩溃](http://www.4hou.com/vulnerable/7595.html)
- 2017.09 [trendmicro] [CVE-2017-0780: DoS 漏洞可导致 Android Messages App 崩溃](https://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-0780-denial-service-vulnerability-android-messages-app/)
- 2017.09 [4hou] [这款开源“神器”,可以找出Android设备最底层的Bootloader漏洞](http://www.4hou.com/info/news/7551.html)
- 2017.08 [vulnerability0lab] [Android Studio 1-4 & 2.3.3 - Manual Local Buffer Overflow Vulnerability](https://www.youtube.com/watch?v=cdXChK64WLc)
- 2017.08 [qq] [【漏洞分析】浅析android手游lua脚本的加密与解密](http://gslab.qq.com/article-294-1.html)
- 2017.08 [cylance] [Broadpwn: The Mobile Exploit for Android and iPhones](https://www.cylance.com/en_us/blog/broadpwn-the-mobile-exploit-for-android-and-iphones.html)
- 2017.08 [360] [Android内核漏洞利用技术实战:环境搭建&栈溢出实战](https://www.anquanke.com/post/id/86617/)
- 2017.08 [trendmicro] [Android, Linux 系统F2FS 文件系统漏洞会导致内存崩溃](https://blog.trendmicro.com/trendlabs-security-intelligence/vulnerability-f2fs-file-system-leads-memory-corruption-android-linux/)
- 2017.08 [esecurityplanet] [Google Patches Android for 49 Vulnerabilities in August Update](https://www.esecurityplanet.com/mobile-security/google-patches-android-for-49-vulnerabilities-in-august-update.html)
- 2017.08 [arxiv] [[1708.02380] Ghera: A Repository of Android App Vulnerability Benchmarks](https://arxiv.org/abs/1708.02380)
- 2017.08 [4hou] [Broadcom Wi-Fi芯片被爆漏洞,数百万台的Android、iOS设备遭殃](http://www.4hou.com/technology/6930.html)
- 2017.07 [pangu] [盘古实验室报告两个Android安全漏洞获Google致谢](http://blog.pangu.io/%e7%9b%98%e5%8f%a4%e5%ae%9e%e9%aa%8c%e5%ae%a4%e6%8a%a5%e5%91%8a%e4%b8%a4%e4%b8%aaandroid%e5%ae%89%e5%85%a8%e6%bc%8f%e6%b4%9e%e8%8e%b7google%e8%87%b4%e8%b0%a2/)
- 2017.07 [pangu] [盘古实验室报告两个Android安全漏洞获Google致谢](http://blog.pangu.io/%e7%9b%98%e5%8f%a4%e5%ae%9e%e9%aa%8c%e5%ae%a4%e6%8a%a5%e5%91%8a%e4%b8%a4%e4%b8%aaandroid%e5%ae%89%e5%85%a8%e6%bc%8f%e6%b4%9e%e8%8e%b7google%e8%87%b4%e8%b0%a2/)
- 2017.06 [trendmicro] [June’s Android Security Bulletin Address Critical Vulnerabilities in Media Framework and Qualcomm Components](https://blog.trendmicro.com/trendlabs-security-intelligence/junes-android-security-bulletin-address-critical-vulnerabilities-media-framework-qualcomm-components/)
- 2017.06 [esecurityplanet] [Google Patches Android and Chrome for Security Vulnerabilities](https://www.esecurityplanet.com/mobile-security/google-patches-android-and-chrome-for-security-vulnerabilities.html)
- 2017.05 [4hou] [Google知道Android漏洞正在被勒索软件滥用,但它近期并不打算修复](http://www.4hou.com/info/news/4720.html)
- 2017.05 [freebuf] [关于Android应用程序漏洞的防护措施](http://www.freebuf.com/articles/terminal/134018.html)
- 2017.05 [ionize] [Android Exploit Development with the Android Open Source Project Toolchain](https://ionize.com.au/android-exploit-development-android-open-source-project-toolchain/)
- 2017.05 [esecurityplanet] [Google Patches 17 Critical Vulnerabilities in Android May Security Update](https://www.esecurityplanet.com/mobile-security/google-patches-17-critical-vulnerabilities-in-android-may-security-update.html)
- 2017.04 [pediy] [[翻译]基于jemalloc的Android漏洞利用技巧----CENSUS](https://bbs.pediy.com/thread-217285.htm)
- 2017.04 [360] [基于jemalloc的Android漏洞利用技巧----CENSUS](https://www.anquanke.com/post/id/85982/)
- 2017.04 [freebuf] [一款Android漏洞测试套件 – AndroidVTS](http://www.freebuf.com/sectool/132932.html)
- 2017.04 [trendmicro] [April Android Security Bulletin Addresses Critical H.264 and H.265 Decoder Vulnerabilities](https://blog.trendmicro.com/trendlabs-security-intelligence/april-android-security-bulletin-addresses-critical-h-264-h-265-decoder-vulnerabilities/)
- 2017.04 [freebuf] [Android安全开发之启动私有组件漏洞浅谈](http://www.freebuf.com/articles/terminal/131356.html)
- 2017.04 [arxiv] [[1704.03356] An Empirical Study on Android-related Vulnerabilities](https://arxiv.org/abs/1704.03356)
- 2017.04 [4hou] [Android安全开发之启动私有组件漏洞浅谈](http://www.4hou.com/technology/4134.html)
- 2017.04 [aliyun] [Android安全开发之启动私有组件漏洞浅谈](https://xz.aliyun.com/t/1201)
- 2017.04 [freebuf] [iOS 10.3.1修复的那个WiFi芯片漏洞,也影响到了数百万Android手机](http://www.freebuf.com/news/131295.html)
- 2017.03 [trendmicro] [Mediaserver Vulnerabilities Highlight Android’s March Security Bulletin](https://blog.trendmicro.com/trendlabs-security-intelligence/mediaserver-vulnerabilities-highlight-androids-march-security-bulletin/)
- 2017.03 [venus] [Exploiting Android S-Boot: Getting Arbitrary Code Exec in the Samsung Bootloader (1/2)](https://paper.seebug.org/237/)
- 2017.02 [hexdetective] [Exploiting Android S-Boot: Getting Arbitrary Code Exec in the Samsung Bootloader (1/2)](http://hexdetective.blogspot.com/2017/02/exploiting-android-s-boot-getting.html)
- 2017.02 [secvul] [Android漏洞checklist](https://secvul.com/topics/571.html)
- 2017.02 [pentestlab] [Android WebView Vulnerabilities](https://pentestlab.blog/2017/02/12/android-webview-vulnerabilities/)
- 2017.02 [freebuf] [Zimperium开始悬赏Android和iPhone漏洞利用代码](http://www.freebuf.com/news/126231.html)
- 2017.02 [freebuf] [Android是今年的漏洞之王?CVE Details的数据根本就不靠谱!](http://www.freebuf.com/articles/neopoints/125701.html)
- 2017.02 [nsfocus] [Android Mediaserver远程代码执行漏洞(CVE-2017-0406)](http://www.nsfocus.net/index.php?act=advisory&do=view&adv_id=94)
- 2017.01 [360] [安卓漏洞:攻击Nexus6和6p自定义引导模式](https://www.anquanke.com/post/id/85288/)
- 2017.01 [securityintelligence] [Android Vulnerabilities: Attacking Nexus 6 and 6P Custom Boot Modes](https://securityintelligence.com/android-vulnerabilities-attacking-nexus-6-and-6p-custom-boot-modes/)
- 2016.12 [360] [两个CVE案例分析:如何利用Android中的可信区域](https://www.anquanke.com/post/id/85184/)
- 2016.12 [ms509] [Android Telephony拒绝服务漏洞(CVE-2016-6763)分析](http://www.ms509.com/2016/12/21/android-telephony-dos/)
- 2016.12 [pediy] [[原创]CVE-2015-8966/AndroidID-31435731](https://bbs.pediy.com/thread-214585.htm)
- 2016.12 [tencent] [CVE-2016-6771: Android语音信箱伪造漏洞分析](https://security.tencent.com/index.php/blog/msg/110)
- 2016.12 [venus] [CVE-2016-6771: Android语音信箱伪造漏洞分析](https://paper.seebug.org/141/)
- 2016.12 [HackingMonks] [Find vulnerability of ANDROID apps like FB (easy with steps)](https://www.youtube.com/watch?v=zbZhOmlDe8M)
- 2016.11 [360] [Fuzzing Android:挖掘Android系统组件组件中的漏洞](https://www.anquanke.com/post/id/84979/)
- 2016.11 [4hou] [什么样的OAuth 2.0协议漏洞能影响10亿Android APP账户?](http://www.4hou.com/vulnerable/1198.html)
- 2016.11 [retme] [Rooting Every Android From Extension To Exploitation (slides)](http://retme.net/index.php/2016/11/06/Rooting-Every-Android-From-Extension-To-Exploitation.html)
- 2016.11 [arxiv] [[1611.00837] Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation](https://arxiv.org/abs/1611.00837)
- 2016.11 [trendmicro] [Security Update Patches 13 Android Vulnerabilities Discovered by Trend Micro](https://blog.trendmicro.com/trendlabs-security-intelligence/security-update-patches-13-android-vulnerabilities-discovered-trend-micro/)
- 2016.11 [lookout] [DirtyCow and Drammer vulnerabilities let attackers root or hijack Android devices](https://blog.lookout.com/dirtycow-and-drammer)
- 2016.10 [freebuf] [如何利用Rowhammer漏洞Root Android手机(含演示视频+Exploit源码)](http://www.freebuf.com/news/118163.html)
- 2016.10 [freebuf] [阿里聚安全Android应用漏洞扫描器解析:本地拒绝服务检测详解](http://www.freebuf.com/sectool/117547.html)
- 2016.10 [pediy] [[原创]安卓Stagefright高危漏洞分析学习总结](https://bbs.pediy.com/thread-213490.htm)
- 2016.10 [pediy] [通杀所有系统的硬件漏洞?聊一聊Drammer,Android上的RowHammer攻击](https://bbs.pediy.com/thread-213472.htm)
- 2016.10 [aliyun] [通杀所有系统的硬件漏洞?聊一聊Drammer,Android上的RowHammer攻击](https://xz.aliyun.com/t/448)
- 2016.10 [contextis] [Targeting Android for OTA Exploitation](https://www.contextis.com/blog/targeting-android-ota-exploitation)
- 2016.10 [konrad] [Exploiting JavaScript code in Android Email Apps](https://medium.com/p/b953f591e77)
- 2016.10 [freebuf] [每16台Android手机中,就有一台受BadKernel漏洞的影响](http://www.freebuf.com/articles/terminal/115933.html)
- 2016.09 [ms509] [Android漏洞CVE-2015-3825分析及exploit实战:从Crash到劫持PC](http://www.ms509.com/2016/09/30/android-cve2015-3825exp/)
- 2016.09 [freebuf] [Android漏洞CVE-2015-3825分析及exploit实战:从Crash到劫持PC](http://www.freebuf.com/vuls/115352.html)
- 2016.09 [trustlook] [Google Offers $200,000 to Find Android Vulnerabilities](https://blog.trustlook.com/2016/09/15/google-offers-200000-to-find-android-vulnerabilities/)
- 2016.09 [4hou] [换一种方式利用安卓系统漏洞](http://www.4hou.com/vulnerable/2053.html)
- 2016.09 [securitygossip] [PREC: Practical Root Exploit Containment for Android Devices](http://securitygossip.com/blog/2016/09/13/2016-09-13/)
- 2016.09 [sjtu] [PREC: Practical Root Exploit Containment for Android Devices](https://loccs.sjtu.edu.cn/gossip/blog/2016/09/13/2016-09-13/)
- 2016.09 [googleprojectzero] [Return to libstagefright: exploiting libutils on Android](https://googleprojectzero.blogspot.com/2016/09/return-to-libstagefright-exploiting.html)
- 2016.08 [4hou] [Linux漏洞可导致约14亿安卓设备被攻击](http://www.4hou.com/info/2854.html)
- 2016.08 [freebuf] [14亿Android设备受Linux TCP漏洞的影响](http://www.freebuf.com/news/112245.html)
- 2016.08 [fortinet] [Deep Analysis of CVE-2016-3820 - Remote Code Execution Vulnerability in Android Mediaserver](https://www.fortinet.com/blog/threat-research/deep-analysis-of-cve-2016-3820-remote-code-execution-vulnerability-in-android-mediaserver.html)
- 2016.08 [welivesecurity] [QuadRooter vulnerabilities leaves 900 million Android devices at risk of attack](https://www.welivesecurity.com/2016/08/11/quadrooter-vulnerabilities-leaves-900-million-android-devices-risk-attack/)
- 2016.08 [freebuf] [高通曝Quadrooter高危漏洞, 影响全球9亿安卓用户](http://www.freebuf.com/vuls/111362.html)
- 2016.08 [checkpoint] [QuadRooter: New Android Vulnerabilities in Over 900 Million Devices | Check Point Software Blog](https://blog.checkpoint.com/2016/08/07/quadrooter/)
- 2016.07 [h2hconference] [Breno Silva - Defeat Android Kernel Exploitation - H2HC 2014](https://www.youtube.com/watch?v=BHysM03pty8)
- 2016.07 [securitygossip] [An Application Package Configuration Approach to Mitigation Android SSL Vulnerabilities](http://securitygossip.com/blog/2016/07/25/2016-07-25/)
- 2016.07 [sjtu] [An Application Package Configuration Approach to Mitigation Android SSL Vulnerabilities](https://loccs.sjtu.edu.cn/gossip/blog/2016/07/25/2016-07-25/)
- 2016.06 [duo] [Thirty Percent of Android Devices Susceptible to 24 Critical Vulnerabilities](https://duo.com/blog/thirty-percent-of-android-devices-susceptible-to-24-critical-vulnerabilities)
- 2016.06 [lookout] [Android June Security Bulletin: Vulnerabilities increasing](https://blog.lookout.com/june-android-security-bulletin)
- 2016.05 [pediy] [[原创][首发]CVE-2015-1805 安卓手机提权ROOT漏洞 分析](https://bbs.pediy.com/thread-210503.htm)
- 2016.05 [securitygossip] [Analyzing Android Browser Apps for File:// Vulnerabilities](http://securitygossip.com/blog/2016/05/25/2016-05-25/)
- 2016.05 [sjtu] [Analyzing Android Browser Apps for File:// Vulnerabilities](https://loccs.sjtu.edu.cn/gossip/blog/2016/05/25/2016-05-25/)
- 2016.05 [duo] [Sixty Percent of Enterprise Android Phones Affected by Critical QSEE Vulnerability](https://duo.com/blog/sixty-percent-of-enterprise-android-phones-affected-by-critical-qsee-vulnerability)
- 2016.05 [kaspersky] [Android under attacks: old vulnerabilities, present threats](https://www.kaspersky.com/blog/android-under-attacks-old-vulnerabilities-present-threats/5564/)
- 2016.04 [freebuf] [Android Minikin 库越界写拒绝服务漏洞分析](http://www.freebuf.com/articles/system/102643.html)
- 2016.04 [fortinet] [Analysis of CVE-2016-2414 - Out-of-Bound Write Denial of Service Vulnerability in Android Minikin Library](https://www.fortinet.com/blog/threat-research/analysis-of-cve-2016-2414-out-of-bound-write-denial-of-service-vulnerability-in-android-minikin-library-1.html)
- 2016.04 [welivesecurity] [Introducing Metaphor: Another Android Stagefright exploit](https://www.welivesecurity.com/2016/04/07/introducing-metaphor-another-android-stagefright-exploit/)
- 2016.04 [freebuf] [Android提权漏洞CVE-2014-7920、CVE-2014-7921分析](http://www.freebuf.com/vuls/100785.html)
- 2016.03 [blackmoreops] [Android vulnerability allows attackers root access](https://www.blackmoreops.com/2016/03/31/android-vulnerability-allows-attackers-root-access/)
- 2016.03 [trendmicro] [Critical ‘CVE-2015-1805’ Vulnerability Allows Permanent Rooting of Most Android Phones](https://blog.trendmicro.com/trendlabs-security-intelligence/critical-cve-2015-1805-vulnerability-allows-permanent-rooting-android-phones/)
- 2016.03 [360] [Truecaller远程代码执行漏洞影响100万安卓设备](https://www.anquanke.com/post/id/83697/)
- 2016.03 [] [Android系统漏洞提权](http://www.91ri.org/15445.html)
- 2016.03 [trendmicro] [Vulnerabilities on SoC-powered Android devices have implications for the IoT](http://blog.trendmicro.com/vulnerabilities-on-soc-powered-android-devices-have-implications-for-the-iot/)
- 2016.03 [trendmicro] [Android Vulnerabilities Allow For Easy Root Access](https://blog.trendmicro.com/trendlabs-security-intelligence/android-vulnerabilities-allow-easy-root-access/)
- 2016.03 [freebuf] [安卓版百度浏览器远程代码执行漏洞分析](http://www.freebuf.com/vuls/97607.html)
- 2016.02 [knownsec] [安卓微信、QQ自带浏览器 UXSS 漏洞](http://blog.knownsec.com/2016/02/android-weixin-qq-uxss/)
- 2016.02 [securityresear] [Android Serialization Vulnerabilities Revisited (RSAC USA '16)](http://securityresear.ch/2016/02/27/android-serialization-vulnerabilities/)
- 2016.02 [pediy] [[原创][首发]cve-2015-0569 安卓手机提权ROOT漏洞 分析](https://bbs.pediy.com/thread-208066.htm)
- 2016.02 [welivesecurity] [Android has some critical remotely-exploitable security holes. But can you get the patch?](https://www.welivesecurity.com/2016/02/02/android-security-holes/)
- 2016.02 [freebuf] [安卓提权漏洞分析(CVE-2014-7920、CVE-2014-7921)](http://www.freebuf.com/vuls/94509.html)
- 2016.01 [bits] [Android privilege escalation to mediaserver from zero permissions (CVE-2014-7920 + CVE-2014-7921)](http://bits-please.blogspot.com/2016/01/android-privilege-escalation-to.html)
- 2016.01 [duo] [Introducing X-Ray 2.0: Vulnerability Detection for Android Devices](https://duo.com/blog/introducing-x-ray-2-0-vulnerability-detection-for-android-devices)
- 2016.01 [evilsocket] [Autopwn Every Android < 4.2 Device on Your Network Using BetterCap and the addJavascriptInterface Vulnerability.](https://www.evilsocket.net/2016/01/18/autopwn-every-android-device-on-your-network-using-bettercap-the-and-addjavascriptinterface-vulnerability/)
- 2016.01 [duo] [Google Patches for Critical Android Vulnerabilities](https://duo.com/blog/google-patches-for-critical-android-vulnerabilities)
- 2015.12 [attify] [Android Application Security Vulnerability : Hacking Twitter Vine app](http://blog.attify.com/2015/12/24/android-application-security-vulnerability-hacking-twitter-vine-app/)
- 2015.12 [attify] [Android Application Security Vulnerability : Hacking Twitter Vine app](https://blog.attify.com/android-application-security-vulnerability-hacking-twitter-vine-app/)
- 2015.12 [flanker017] [ANDROIDID-24123723 (CVE-2015-6620) POC and writeup](https://blog.flanker017.me/androidid-24123723-cve-2015-6620-poc-and-writeup/)
- 2015.12 [freebuf] [Android WebView远程执行代码漏洞浅析](http://www.freebuf.com/vuls/90552.html)
- 2015.12 [nsfocus] [Android WebView 远程执行代码漏洞浅析](http://blog.nsfocus.net/android-webview-remote-code-execution-vulnerability-analysis/)
- 2015.12 [360] [Android漏洞利用方式之NFC浅析](https://www.anquanke.com/post/id/83073/)
- 2015.12 [360] [Android平台下二维码漏洞攻击杂谈](https://www.anquanke.com/post/id/83032/)
- 2015.11 [comparitech] [This week in InfoSec – Chrome says goodbye to ageing operating systems, checking for Android vulnerabilities, home user tips and how to make security your next career move](https://www.comparitech.com/blog/this-week-in-infosec-chrome-says-goodbye-to-ageing-operating-systems-checking-for-android-vulnerabilities-home-user-tips-and-how-to-make-security-your-next-career-move/)
- 2015.11 [freebuf] [Hacking Team安卓浏览器攻击过程中的漏洞分析 Stage4](http://www.freebuf.com/vuls/84720.html)
- 2015.11 [freebuf] [AndroidVTS:Android手机漏洞缺陷检测App](http://www.freebuf.com/sectool/84526.html)
- 2015.11 [angelalonso] [PoC to exploit Android Wormhole Vulnerability](http://blog.angelalonso.es/2015/11/poc-to-exploit-android-wormhole.html)
- 2015.11 [freebuf] [Hacking Team安卓浏览器攻击过程中的漏洞分析 Stage3](http://www.freebuf.com/vuls/83950.html)
- 2015.10 [freebuf] [FreeBuf 追踪报道:虫洞(wormhole)漏洞来袭,多款百度热门安卓应用中枪](http://www.freebuf.com/news/83271.html)
- 2015.10 [freebuf] [Hacking Team安卓浏览器攻击过程中的漏洞分析 Stage 2](http://www.freebuf.com/vuls/82977.html)
- 2015.10 [freebuf] [美运营商4G网络存在漏洞,波及所有安卓用户](http://www.freebuf.com/vuls/82276.html)
- 2015.10 [welivesecurity] [LTE vulnerabilities puts Android devices at risk of attack](https://www.welivesecurity.com/2015/10/19/lte-vulnerabilities-puts-android-devices-risk-attack/)
- 2015.10 [360] [Android 5.0屏幕录制漏洞(CVE-2015-3878)威胁预警](https://www.anquanke.com/post/id/82740/)
- 2015.10 [trendmicro] [Android Security Update Includes Fix for Stagefright Vulnerabilities Discovered by Trend Micro](https://blog.trendmicro.com/trendlabs-security-intelligence/android-security-update-includes-fix-for-stagefright-vulnerabilities-discovered-by-trend-micro/)
- 2015.10 [8090] [iOS漏洞竟然8倍于安卓!!!](http://www.8090-sec.com/archives/886)
- 2015.10 [hackingarticles] [Hack Android Phone WhatsApp and all Directories using Mercury Browser Vulnerability](http://www.hackingarticles.in/hack-android-phone-whatsapp-and-all-directories-using-mercury-browser-vulnerability/)
- 2015.10 [freebuf] [Hacking Team安卓浏览器攻击过程中的漏洞分析 Stage1](http://www.freebuf.com/vuls/80873.html)
- 2015.10 [] [QARK-快速的Android漏洞的审计工具](http://www.91ri.org/14351.html)
- 2015.10 [freebuf] [Stagefright 2.0漏洞来袭 影响上亿安卓用户](http://www.freebuf.com/news/80427.html)
- 2015.09 [freebuf] [Android漏洞检测套件](http://www.freebuf.com/news/80028.html)
- 2015.09 [freebuf] [Hacking Team安卓浏览器攻击过程中的漏洞分析 Stage0](http://www.freebuf.com/vuls/78594.html)
- 2015.09 [360] [Android 5.x 锁屏绕过 (CVE-2015-3860)](https://www.anquanke.com/post/id/82416/)
- 2015.09 [freebuf] [Android 5.x漏洞:黑客可以绕过屏幕密码进入系统](http://www.freebuf.com/articles/terminal/78455.html)
- 2015.09 [trustlook] [Android signature verification vulnerability and exploitation](https://blog.trustlook.com/2015/09/09/android-signature-verification-vulnerability-and-exploitation/)
- 2015.09 [TheHackerStuff] [Android Bugs - Top 5 New Android Vulnerabilities 2017](https://www.youtube.com/watch?v=UBVv69KZ2u0)
- 2015.09 [freebuf] [安卓平台Mercury浏览器漏洞分析](http://www.freebuf.com/vuls/77067.html)
- 2015.08 [] [Android libcutils库中整数溢出导致的堆破坏漏洞的发现与利用](http://blogs.360.cn/blog/android-libcutils%e5%ba%93%e4%b8%ad%e6%95%b4%e6%95%b0%e6%ba%a2%e5%87%ba%e5%af%bc%e8%87%b4%e7%9a%84%e5%a0%86%e7%a0%b4%e5%9d%8f%e6%bc%8f%e6%b4%9e%e7%9a%84%e5%8f%91%e7%8e%b0%e4%b8%8e%e5%88%a9%e7%94%a8/)
- 2015.08 [welivesecurity] [Dolphin and Mercury Android browsers have major vulnerabilities](https://www.welivesecurity.com/2015/08/26/dolphin-mercury-android-browsers-major-vulnerabilities/)
- 2015.08 [bits] [Android linux kernel privilege escalation (CVE-2014-4323)](http://bits-please.blogspot.com/2015/08/android-linux-kernel-privilege_26.html)
- 2015.08 [benthamsgaze] [Experimenting with SSL Vulnerabilities in Android Apps](https://www.benthamsgaze.org/2015/08/20/experimenting-with-ssl-vulnerabilities-in-android-apps/)
- 2015.08 [trendmicro] [MediaServer Takes Another Hit with Latest Android Vulnerability](https://blog.trendmicro.com/trendlabs-security-intelligence/mediaserver-takes-another-hit-with-latest-android-vulnerability/)
- 2015.08 [freebuf] [安卓预装插件“证书门”漏洞分析还原](http://www.freebuf.com/vuls/75228.html)
- 2015.08 [bits] [Android linux kernel privilege escalation vulnerability and exploit (CVE-2014-4322)](http://bits-please.blogspot.com/2015/08/android-linux-kernel-privilege.html)
- 2015.08 [securityintelligence] [One Class to Rule Them All: New Android Serialization Vulnerability Gives Underprivileged Apps Super Status](https://securityintelligence.com/one-class-to-rule-them-all-new-android-serialization-vulnerability-gives-underprivileged-apps-super-status/)
- 2015.08 [checkpoint] [MEDIA ALERT: Check Point Discovers Massive Vulnerability in Android Devices](https://www.checkpoint.com/press/2015/media-alert-check-point-discovers-massive-vulnerability-in-android-devices/)
- 2015.08 [freebuf] [安卓曝无限重启漏洞(CVE-2015-3823),影响近90%安卓手机用户](http://www.freebuf.com/news/74261.html)
- 2015.08 [freebuf] [Android Broadcast组件权限绕过漏洞](http://www.freebuf.com/articles/terminal/73885.html)
- 2015.07 [freebuf] [安卓再曝新漏洞:可远程致使用户无法接打电话](http://www.freebuf.com/news/73755.html)
- 2015.07 [acunetix] [In the headlines: Android vulnerabilities, MongoDB database and more](https://www.acunetix.com/blog/articles/in-the-headlines-android-vulnerabilities-mongodb-database-and-more/)
- 2015.07 [freebuf] [技术分析:关于安卓libStagefright系列漏洞分析](http://www.freebuf.com/vuls/73618.html)
- 2015.07 [arxiv] [[1507.08694] Android Tapjacking Vulnerability](https://arxiv.org/abs/1507.08694)
- 2015.07 [trendmicro] [Trend Micro Discovers Vulnerability That Renders Android Devices Silent](https://blog.trendmicro.com/trendlabs-security-intelligence/trend-micro-discovers-vulnerability-that-renders-android-devices-silent/)
- 2015.07 [pediy] [[讨论][分享]关于最近很火的安卓stagefright漏洞](https://bbs.pediy.com/thread-202868.htm)
- 2015.07 [virusbulletin] [Stagefright vulnerability leaves 950 million Android devices vulnerable to remote code execution](https://www.virusbulletin.com/blog/2015/07/stagefright-vulnerability-leaves-950-million-android-devices-vulnerable-remote-code-execution/)
- 2015.07 [trendmicro] [Epic Android Vulnerability – What does it mean for you?](http://blog.trendmicro.com/epic-android-vulnerability-what-does-it-mean-for-you/)
- 2015.07 [freebuf] [安卓Stagefright高危漏洞初探](http://www.freebuf.com/articles/terminal/73517.html)
- 2015.07 [sans] [Android Stagefright multimedia viewer prone to remote exploitation](https://isc.sans.edu/forums/diary/Android+Stagefright+multimedia+viewer+prone+to+remote+exploitation/19965/)
- 2015.07 [tencent] [Hacking