Jirairya

技能树--AndroidSecurity


#android-security-awesome

A collection of android security related resources.

A lot of work is happening in academia and industry on tools to perform dynamic analysis, static analysis and reverse engineering of android apps.

ONLINE ANALYZERS

  1. AndroTotal

STATIC ANALYSIS TOOLS

  1. Androwarn - detect and warn the user about potential malicious behaviours developped by an Android application.

APP VULNERABILITY SCANNERS

  1. QARK - QARK by LinkedIn is for app developers to scan app for security issues
  2. AndroBugs
  3. Nogotofail

DYNAMIC ANALYSIS TOOLS

  1. Android DBI frameowork
    • Android Malware Analysis Toolkit - (linux distro) Earlier it use to be an online analyzer
    • Mobile-Security-Framework MobSF - Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.
    • AppUse – custom build for pentesting
    • Cobradroid – custom image for malware analysis
    • ViaLab Community Edition
    • Droidbox
    • Mercury
    • Drozer
    • Taintdroid - requires AOSP compilation
    • Xposed - equivalent of doing Stub based code injection but without any modifications to the binary
    • Android Hooker - API Hooking of java methods triggered by any Android application (requires the Substrate Framework)
    • Android tamer - custom image
    • Droidscope - custom image for dynamic analysis
    • CuckooDroid - Android extension for Cuckoo sandbox
    • Mem - Memory analysis of Android (root required)
    • Crowdroid – unable to find the actual tool
    • AuditdAndroid – android port of auditd, not under active development anymore
    • Android Security Evaluation Framework - not under active development anymore
    • Android Reverse Engineering – ARE (android reverse engineering) not under active development anymore
    • Aurasium – Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.
    • Android Linux Kernel modules *
    • Appie - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment.It is completely portable and can be carried on USB stick or smartphone.This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
    • StaDynA - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information.
    • DroidAnalytics - incomplete
    • Vezir Project - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis

REVERSE ENGINEERING

  1. Smali/Baksmali – apk decompilation

FUZZ TESTING

  1. IntentFuzzer

APP REPACKAGING DETECTORS

  1. FSquaDRA - a tool for detection of repackaged Android applications based on app resources hash comparison.

Exploitable Vulnerabilties

  1. Vulnerability Google doc

SAMPLE SOURCES

  1. contagio mini dump
  2. Android malware github repo

Reading material

  1. Android Security (and Not) Internals

MARKET CRAWLERS

  1. Google play crawler (Java)

MISC TOOLS

  1. smalihook

Good Tutorials

  1. Android Reverse Engineering 101 by Daniele Altomare

Other Awesome Lists

Other amazingly awesome lists can be found in the awesome-awesomeness list.

Contributing

Your contributions are always welcome!

Content