Skip to main content

Android Malware Analysis Tools


http://www.nyxbone.com/malware/android_tools.html
Android Malware Analysis Tools Imagen by davidsancar   


TOOLS

» AFLogical - Android forensics tool developed by viaForensics
» AndroChef - Java Decompiler apk, dex, jar and java class-files
» Androguard - Reverse engineering, Malware and goodware analysis of Android applications
» Android Loadable Kernel Modules
» Android SDK
» Android4me - J2ME port of Google's Android
» Android-apktool - A tool for reverse engineering Android apk files
» Android-forensics - Open source Android Forensics app and framework
» Android-random - Collection of extended examples for Android developers
» APK Studio - Android Reverse Engineering Tool By Vaibhav Pandey a.k.a VPZ
» ApkAnalyser - Static, virtual analysis tool
» Apk-extractor - Android Application (.apk) file extractor and Parser for Android Binary XML
» Apkinspector - Powerful GUI tool for analysts to analyze the Android applications
» Apk-recovery - Recover main resources from your .apk file
» ART - GUI for all your decompiling and recompiling needs
» Audit tools
» Canhazaxs - A tool for enumerating the access to entries in the file system of an Android device
» Dava - Decompiler for arbitrary Java bytecode
» DDMS - Dalvik Debug Monitor Server
» Decaf-platform - DECAF Binary Analysis Platform
» DecoJer - Java Decompiler
» Dedexer - Disassembler tool for DEX files.
» Device Monitor - Graphical user interface for several Android application debugging and analysis tools
» Dex2jar - Tools to work with android .dex and java .class files
» Dex-decomplier - Dex decompiler
» Dexinfo - A very rudimentary Android DEX file parser
» Dexter - Static android application analysis tool
» Dexterity - Dex manipulation library
» Dextools - Miscellaenous DEX (Dalvik Executable) tools
» Drozer - Comprehensive security audit and attack framework for Android
» Heimdall - Cross-platform open-source tool suite used to flash firmware (aka ROMs) onto Samsung mobile devices
» Hidex - Demo application where a method named thisishidden() in class MrHyde is hidden from disassemblers but no called by the app
» Hooker - Automated Dynamic Analysis of Android Applications
» JAD - Java Decompiler
» JADX - Dex to Java decompiler
» JD-GUI - Standalone graphical utility that displays Java source codes of “.class” files
» JEB Decompiler - The Interactive Android Decompiler
» Luyten - Java Decompiler Gui for Procyon
» Radare - The reverse engineering framework
» Redexer - A Dalvik bytecode instrumentation framework
» Reverse Android - Reverse-engineering tools for Android applications
» Scalpel - A surgical debugging tool to uncover the layers under your app
» Smali - An assembler/disassembler for Android's dex format
» Soot - Java Optimization Framework
» STAMP - STatic Analysis of Mobile Programs
» Systrace - Analyze the performance capturing and displaying execution times of your applications and other Android system processes
» TaintDroid - Tracking how apps use sensitive information required
» Traceview - Graphical viewer for execution logs saved by your application
» Undx - Bytecode translator
» Xenotix-APK-Decompiler - APK decompiler powered by dex2jar and JAD
» XML-apk-parser - Print AndroidManifest.xml directly from apk file
» ZjDroid - Android app dynamic reverse tool based on Xposed framework



UNPACKERS

» Android Unpacker - Android Unpacker presented at Defcon 22 - Android Hacker Protection Level 0
» Dehoser - Unpacker for the HoseDex2Jar APK Protection which packs the original file inside the dex header
» Kisskiss - Unpacker for various Android packers/protectors


PACKERS / OBFUSCATORS

» Allatori
» APKfuscator - A generic DEX file obfuscator and munger
» APKProtect
» Bangcle
» DexGuard - Optimizer and obfuscator for Android
» HoseDex2Jar - Adds some instructions to the classes.dex file that Dex2Jar can not process
» ProGuard - Shrinks, optimizes, and obfuscates the code by removing unused code and renaming classes, fields, and methods with semantically obscure names


TOOLKITS

» Android Malware Analysis Toolkit
» APK Resource Toolkit
» MobiSec
» Open Source Android Forensics Toolkit
» Santoku


SANDBOXES

» Android Sandbox
» Anubis
» APK Analyzer
» AVCaesar
» Droidbox
» HackApp
» Mobile Sandbox
» SandDroid
» VisualThreat

Comments

Popular posts from this blog

The Difference Between LEGO MINDSTORMS EV3 Home Edition (#31313) and LEGO MINDSTORMS Education EV3 (#45544)

http://robotsquare.com/2013/11/25/difference-between-ev3-home-edition-and-education-ev3/ This article covers the difference between the LEGO MINDSTORMS EV3 Home Edition and LEGO MINDSTORMS Education EV3 products. Other articles in the ‘difference between’ series: * The difference and compatibility between EV3 and NXT ( link ) * The difference between NXT Home Edition and NXT Education products ( link ) One robotics platform, two targets The LEGO MINDSTORMS EV3 robotics platform has been developed for two different target audiences. We have home users (children and hobbyists) and educational users (students and teachers). LEGO has designed a base set for each group, as well as several add on sets. There isn’t a clear line between home users and educational users, though. It’s fine to use the Education set at home, and it’s fine to use the Home Edition set at school. This article aims to clarify the differences between the two product lines so you can decide which

Let’s ban PowerPoint in lectures – it makes students more stupid and professors more boring

https://theconversation.com/lets-ban-powerpoint-in-lectures-it-makes-students-more-stupid-and-professors-more-boring-36183 Reading bullet points off a screen doesn't teach anyone anything. Author Bent Meier Sørensen Professor in Philosophy and Business at Copenhagen Business School Disclosure Statement Bent Meier Sørensen does not work for, consult to, own shares in or receive funding from any company or organisation that would benefit from this article, and has no relevant affiliations. The Conversation is funded by CSIRO, Melbourne, Monash, RMIT, UTS, UWA, ACU, ANU, ASB, Baker IDI, Canberra, CDU, Curtin, Deakin, ECU, Flinders, Griffith, the Harry Perkins Institute, JCU, La Trobe, Massey, Murdoch, Newcastle, UQ, QUT, SAHMRI, Swinburne, Sydney, UNDA, UNE, UniSA, UNSW, USC, USQ, UTAS, UWS, VU and Wollongong.

Logic Analyzer with STM32 Boards

https://sysprogs.com/w/how-we-turned-8-popular-stm32-boards-into-powerful-logic-analyzers/ How We Turned 8 Popular STM32 Boards into Powerful Logic Analyzers March 23, 2017 Ivan Shcherbakov The idea of making a “soft logic analyzer” that will run on top of popular prototyping boards has been crossing my mind since we first got acquainted with the STM32 Discovery and Nucleo boards. The STM32 GPIO is blazingly fast and the built-in DMA controller looks powerful enough to handle high bandwidths. So having that in mind, we spent several months perfecting both software and firmware side and here is what we got in the end. Capturing the signals The main challenge when using a microcontroller like STM32 as a core of a logic analyzer is dealing with sampling irregularities. Unlike FPGA-based analyzers, the microcontroller has to share the same resources to load instructions from memory, read/write the program state and capture the external inputs from the G