Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/user1342/Awesome-Android-Reverse-Engineering
A curated list of awesome Android Reverse Engineering training, resources, and tools.
https://github.com/user1342/Awesome-Android-Reverse-Engineering
List: Awesome-Android-Reverse-Engineering
android application-security awesome awesome-list crackmes ctfs malware-analysis mobsec reverse-engineering tools training
Last synced: about 2 months ago
JSON representation
A curated list of awesome Android Reverse Engineering training, resources, and tools.
- Host: GitHub
- URL: https://github.com/user1342/Awesome-Android-Reverse-Engineering
- Owner: user1342
- License: mit
- Created: 2023-04-09T09:34:47.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-04-13T06:36:59.000Z (8 months ago)
- Last Synced: 2024-05-21T03:11:57.595Z (7 months ago)
- Topics: android, application-security, awesome, awesome-list, crackmes, ctfs, malware-analysis, mobsec, reverse-engineering, tools, training
- Homepage:
- Size: 109 KB
- Stars: 541
- Watchers: 11
- Forks: 63
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Contributing: .github/CONTRIBUTING.md
- License: LICENSE
- Code of conduct: .github/CODE_OF_CONDUCT.md
- Codeowners: .github/CODEOWNERS
- Security: .github/SECURITY.md
Awesome Lists containing this project
- ultimate-awesome - Awesome-Android-Reverse-Engineering - A curated list of awesome Android Reverse Engineering training, resources, and tools. (Other Lists / Monkey C Lists)
README
# Awesome Android Reverse Engineering
A curated list of awesome Android Reverse Engineering training, resources, and tools.[![Awesome](https://awesome.re/badge.svg)](https://github.com/MarketingPipeline/Awesome-Repo-Template/)
![GitHub contributors](https://img.shields.io/github/contributors/user1342/Awesome-Android-Reverse-Engineering)
![GitHub Repo stars](https://img.shields.io/github/stars/user1342/Awesome-Android-Reverse-Engineering?style=social)
![GitHub watchers](https://img.shields.io/github/watchers/user1342/Awesome-Android-Reverse-Engineering?style=social)
![GitHub last commit](https://img.shields.io/github/last-commit/user1342/Awesome-Android-Reverse-Engineering)# How to Use
Awesome-Android-Reverse-Engineering is an amazing list for people who work in taking apart Android applications, systems, or components. Simply press ```ctrl + F``` to search for a keyword, go through our Contents Menu, or lookout for a '☆' indicating some great and up-to-date resources.# Contents
- [Training](#Training "Training")
- [Courses and Material](#Courses-and-Material "Courses-and-Material")
- [Videos](#videos)
- [Books](#Books "Books")
- [Tools](#Tools "Tools")
- [Static Analysis Tools](#Static-Analysis-Tools)
- [Dynamic Analysis Tools](#Dynamic-Analysis-Tools)
- [Decompilers](#Decompilers "Decompilers")
- [Malware Analysis](#Malware-Analysis)
- [Resources](#Resources "Resources")
- [Documentation](#Documentation)
- [Case Studies](#case-studies)
- [CTFs and CrackMe's](#CTFs-and-CrackMes)
- [Misc](#Misc)## Training
### Courses and Material
- [☆ Maddie Stone's Android Reverse Engineering Training ](https://www.ragingrock.com/AndroidAppRE/ "Maddie Stone's Android Reverse Engineering Training ")- A comprehensive online training course on Android reverse engineering by Maddie Stone.
- [Introduction to Assembly from Azeria Labs](https://azeria-labs.com/writing-arm-assembly-part-1/) - Covering everything from Data Types, Registers, the ARM Instruction Set, Memory Instructions, and more
- [Android Penetration Testing From #TODO](https://www.reverseengineering.courses/course/android-penetration-testing/) - This course will see you develop a baseline knowledge of what is involved in mobile penetration testing along with the specific tools, techniques, and frameworks involved in taking apart and analyzing Android applications.### Videos
- [Kristina Balaam Android Reverse Engineering](https://www.youtube.com/@chmodxx) - A video series on reverse engineering basics and reverse engineering Android malware.
- [LaurieWired Android Reverse Engineering videos](https://www.youtube.com/@lauriewired) - A YouTube channel focusing on Android reverse engineering.
- [Using Frida To Modify Android Games | Mobile Dynamic Instrumentation](https://www.youtube.com/watch?v=BXtAujoPhQw) - Focusing on Reverse engineering Android applications and on using Frida to dynamically modify Android games.### Books
- [☆ Android Internals: A Confectioner's Cookbook](http://newandroidbook.com/ "Android Internals: A Confectioner's Cookbook") - An in-depth exploration of the inner-workings of Android: In Volume I, we take the perspective of the Power User as we delve into the foundations of Android, filesystems, partitions, boot process, native daemons and services.
- [Blue Fox: Arm Assembly Internals and Reverse Engineering](https://www.amazon.co.uk/dp/1119745306) - Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analysing and securing billions of Arm devices.
- [Android Software Internals Quick Reference](https://www.amazon.co.uk/Android-Software-Internals-Quick-Reference/dp/1484269136) - This book focuses on easily digestible, useful, and interesting techniques in Java and the Android system. Including: encryption and obfuscation, debugging, and APK extraction.
- [☆ Mobile Offensive Security Pocket Guide](https://www.amazon.co.uk/Mobile-Offensive-Security-Pocket-Guide/dp/1399921959/ref=sr_1_4) - Focusing on Android and iOS operating systems, the book contains a series of succinct chapters that highlight key information, approaches, and tooling used by mobile penetration testers and offensive security practitioners.
- [Android Security Internals](https://nostarch.com/androidsecurity) - Describing Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration.
- [Android Malware Detection with Machine Learning](https://nostarch.com/androidmalwaredetection) - Examine the machine-learning techniques used to detect malicious apps, the types of classification models that defenders can use, and the various features of malware specimens that can become input to these models.## Tools
### Static Analysis Tools
- [QARK](https://github.com/linkedin/qark "QARK") - An open-source tool developed by LinkedIn for automatic Android app vulnerability scanning, including identifying potential security issues such as SQL injection, insecure data storage, and more.
- [Quark Engine](https://github.com/quark-engine/quark-engine) - The goal of Quark Script aims to provide an innovative way for mobile security researchers to analyze or pentest the targets. Based on Quark, we integrate decent tools as Quark Script APIs and make them exchange valuable intelligence to each other.
- [MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF "MobSF") - An open-source mobile app security testing framework that supports static and dynamic analysis of Android apps for vulnerabilities and privacy issues.
- [AndroBugs Framework](https://github.com/AndroBugs/AndroBugs_Framework "AndroBugs Framework") - An open-source framework for analysing and scanning Android apps for security issues, including static and dynamic analysis capabilities.
- [☆ imjtool](http://newandroidbook.com/tools/imjtool.html) - Firmware unpacking tool applicable to the widest variety of vendors and formats.
- [Android Studio](https://developer.android.com/studio) - Useful if you don’t have a JEB licence and want to open a decompiled (via JADx) app into a proper IDE.
- [☆ APK Dependency Graph](https://github.com/alexzaitsev/apk-dependency-graph) - An APK class dependency visualizer. Useful for attack surface mapping.
- [disarm](http://newandroidbook.com/tools/disarm.html) - A simple command line utility that takes as an argument a 32-bit hexadecimal number, and parses it as an ARM-64 instruction, providing the disassembly.
- [COVA](https://github.com/secure-software-engineering/COVA) - COVA is a static analysis tool to compute path constraints based on user-defined APIs.
- [DIS{integrity}](https://github.com/user1342/DISintegrity) - A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.#### De-Obfuscation
- [☆ Obfu[DE]scate](https://github.com/user1342/Obfu-DE-Scate) - Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even if they have been renamed as part of obfuscation. It compares two versions of an APK and generates a mapping text file and an interactive HTML file as outputs!
- [TinySmaliEmulator](https://github.com/amoulu/TinySmaliEmulator) - A minimalist smali emulator that could be used to "decrypt" obfuscated strings.
- [simplify](https://github.com/CalebFenton/simplify) - Android virtual machine and deobfuscator.
- [deoptfuscator](https://github.com/Gyoonus/deoptfuscator) - Deoptfuscator is a tool for deobfuscating Android applications that have been transformed using control-flow obfuscation mechanisms.### Dynamic Analysis Tools
- [Drozer](https://github.com/WithSecureLabs/drozer "Drozer") - An open-source framework for Android security testing that provides a comprehensive set of tools for dynamic analysis, including intercepting, modifying, and analysing app traffic.
- [jtrace](http://newandroidbook.com/tools/jtrace.html) - strace for Android - for tracing system-level calls including Binder.
- [sesearch](https://linux.die.net/man/1/sesearch) - Command line tool to query SELinux policies.
- [AutoDroid](https://github.com/user1342/AutoDroid) - Tool for mass gathering APKs from a device(s), decompiling, filtering on strings, etc.#### Networking
- [☆ Burp Suite](https://portswigger.net/burp "Burp Suite") - A popular commercial web security testing tool that can be used for analysing network traffic of Android apps for potential security vulnerabilities.
- [Wireshark](https://www.wireshark.org/ "Wireshark") - A widely used open-source network protocol analyzer that can capture, analyse, and dissect network traffic generated by Android apps for security analysis.
- [SSLsplit](https://github.com/droe/sslsplit "SSLsplit") - An open-source tool for intercepting and manipulating SSL/TLS encrypted traffic, which can be used for analysing SSL/TLS communication in Android apps.
- [MITMProxy](https://mitmproxy.org/ "MITMProxy") - An open-source man-in-the-middle proxy that allows for intercepting and analysing network traffic generated by Android apps for security testing and analysis.
- [apk-mitm](https://github.com/shroudedcode/apk-mitm) - A CLI application that automatically prepares Android APK files for HTTPS inspection.#### Dynamic Instrumentation
- [☆ Frida](https://frida.re/ "Frida") - A dynamic instrumentation toolkit for Android apps that allows for runtime manipulation and analysis of app behaviour.
- Xposed Framework - A powerful framework for hooking and modifying the behaviour of Android apps at runtime, commonly used for reverse engineering and analysis.
- [☆ Objection](https://github.com/sensepost/objection "Objection") - A runtime mobile exploration tool for Android that provides various features for analysing, manipulating, and bypassing app security controls.
- [RMS Runtime Mobile Security](https://github.com/m0bilesecurity/RMS-Runtime-Mobile-Security) - Frida web interface.
- [☆ FriDump](https://github.com/Nightbringer21/fridump) - A Python script that utilises Frida to dump the memory of a running gadget, such as an app activity.
- [jnitrace](https://github.com/chame1eon/jnitrace) - A Frida based tool to trace use of the JNI API in Android apps.
- [☆ Binder Trace](https://github.com/foundryzero/binder-trace) - Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".### Decompilers
- [☆ JADX](https://github.com/skylot/jadx "JADX") - An open-source tool for decompiling and analysing Android APK files into Java source code for reverse engineering and analysis.
- [Procyon](https://github.com/mstrobel/procyon "Procyon") - Procyon is a suite of Java metaprogramming tools, including a rich reflection API, a LINQ-inspired expression tree API for runtime code generation, and a Java decompiler.
- [Cfr](https://github.com/leibnitz27/cfr "Cfr") - An open-source Java decompiler that supports decompilation of Android APK files into Java source code, including support for newer Java language features.
- [FernFlower](https://github.com/JetBrains/intellij-community/tree/master/plugins/java-decompiler/engine "FernFlower") - Fernflower is the first actually working analytical decompiler for Java and probably for a high-level programming language in general.
- [☆ Apktool](https://ibotpeaches.github.io/Apktool/ "Apktool") - A popular open-source tool for decompiling and recompiling Android APK files.
- [DEX2JAR](https://github.com/pxb1988/dex2jar "DEX2JAR") - A tool for converting Android DEX files to JAR files, which can be further analysed using Java decompilers.
- [JDGui](http://java-decompiler.github.io/) - JD-GUI is a standalone graphical utility that displays Java source codes of “.class” files.
- [IDA Pro](https://hex-rays.com/ida-pro/ " IDA Pro") - A powerful commercial disassembler and debugger for analysing Android native code.
- [☆ Ghidra](https://ghidra-sre.org/ "Ghidra") - A free and open-source software reverse engineering (SRE) framework developed by the National Security Agency (NSA) that supports Android analysis.
- JEB Decompiler - A commercial decompiler for Android apps that can decompile APK files into Java source code for analysis.
- [Radare2](https://rada.re/n/ "Radare2") - A free and open-source reverse engineering framework that supports Android analysis, including disassembly, debugging, and binary analysis.
- [Androguard](https://github.com/androguard/androguard "Androguard") - An open-source tool for analysing and reverse engineering Android apps, including decompiling APK files, analysing Dalvik bytecode, and more.
- [apk2gold](https://github.com/lxdvs/apk2gold) - CLI tool for decompiling Android apps to Java. Doing both resources and Java (this repo is 9 years old, and so may not work with newer Android versions).
- [AndroidProjectCreator](https://github.com/ThisIsLibra/AndroidProjectCreator) - Convert an APK to an Android Studio Project using multiple open-source decompilers.
- [APK Studio](https://github.com/vaibhavpandeyvpz/apkstudio) - Open-source, cross platform Qt based IDE for reverse-engineering Android application packages.
- [show-java](https://github.com/niranjan94/show-java) - An APK (android application), JAR & Dex decompiler for android.
- [☆ APKLab](https://marketplace.visualstudio.com/items?itemName=Surendrajat.apklab) - APKLab seamlessly integrates Quark-Engine, Apktool, Jadx, uber-apk-signer, apk-mitm and more to VS Code.### Malware Analysis
- [DroidDetective](https://github.com/user1342/DroidDetective) - A machine learning malware analysis framework for Android apps.
- [Cuckoo Droid](https://github.com/idanr1986/cuckoodroid-2.0) - CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.
- [androwarn](https://github.com/maaaaz/androwarn) - A static code analyzer for malicious Android applications.## Resources
### Documentation
- [Android Security Documentation](https://source.android.com/docs/security "Android Security Documentation") - Official documentation from Google on Android security, including topics related to reverse engineering.
- [Android Reverse Engineering Challenges ](https://github.com/apsdehal/awesome-ctf#reverse-engineering "Android Reverse Engineering Challenges ")- A curated list of Android reverse engineering challenges and CTFs (Capture The Flag) for practice.
- [AndroidXref](http://androidxref.com/) - Open code search for Android source.
- [APKMirror](https://www.apkmirror.com/) - Repository of Android APKs from sources such as the Play Store and user uploads.
- [APKPure](https://m.apkpure.com/) - Repository of Android APKs from sources such as the Play Store and user uploads.### Case Studies
- [A Reverse Engineer’s Post-mortem Of The Houseparty Video Chat App](https://www.jamesstevenson.me/a-reverse-engineers-post-mortem-of-the-houseparty-video-chat-app/)
- [SharkBot: a “new” generation Android banking Trojan being distributed on Google Play Store](https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/)
- [In-the-Wild Series: Android Exploits](https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html)## CTFs and CrackMes
- [☆ UnCrackable Mobile Apps](https://github.com/OWASP/owasp-mastg/tree/master/Crackmes) - A set of OWASP Android app Crackme's. These challenges are used as examples throughout the OWASP MASTG. Of course, you can also solve them for fun.
- [CyberTruckChallenge19](https://github.com/nowsecure/cybertruckchallenge19) - Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).
- [KGB Messenger](https://github.com/tlamb96/kgb_messenger) - KGB Messenger is an open source CTF practice challenge that aims to help people learn how to reverse engineer Android applications.## Misc
- [LADB](https://github.com/tytydraco/LADB) - A local ADB shell for Android!
- [Broken Droid Factory](https://github.com/user1342/Broken-Droid-Factory) - BDF is a Python tool designed to spin-up pseudo random vulnerable Android applications for training when it comes to vulnerability research, ethical hacking, and pen testing on Android apps.
- [uber-apk-signer](https://github.com/patrickfav/uber-apk-signer) - A cli tool that helps signing and zip aligning single or multiple Android application packages (APKs) with either debug or provided release certificates. It supports v1, v2 and v3 Android signing scheme has an embedded debug keystore and auto verifies after signing.
- [RUNIC tamper detection demo](https://github.com/user1342/RUNIC) - Designed to serve as a parallel for understanding more complex Android tamper detection and integrity systems such as Google Play SafetyNet and Huawei Safety Detect.## Contributing
Your contributions are always welcome! Please read the contribution guidelines first. We follow the Contributor Covenant Code of Conduct. Please make sure to review and adhere to this code of conduct when contributing.## Licence ![GitHub](https://img.shields.io/github/license/user1342/Awesome-Android-Reverse-Engineering)
This project is licensed under the MIT License - see the LICENSE.md file for details.