A collection of Android security-related resources.
- AndroTotal
- π Appknox - not free
- π Virustotal - max 128MB
- Fraunhofer App-ray - not free
- π NowSecure Lab Automated - Enterprise tool for mobile app security testing both Android and iOS mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes. Not free
- π App Detonator - Detonate APK binary to provide source code level details including app author, signature, build, and manifest information. 3 Analysis/day free quota.
- π Pithus - Open-Source APK analyzer. Still in Beta for the moment and limited to static analysis for the moment. Possible to hunt malware with Yara rules. More π here.
- π Oversecured - Enterprise vulnerability scanner for Android and iOS apps, it offers app owners and developers the ability to secure each new version of a mobile app by integrating Oversecured into the development process. Not free.
- π AppSweep by Guardsquare - Free, fast Android application security testing for developers
- π Koodous - Performs static/dynamic malware analysis over a vast repository of Android samples and checks them against public and private Yara rules.
- π Immuniweb. Does a "OWASP Mobile Top 10 Test", "Mobile App Privacy Check" and an application permissions test. Free tier is 4 tests per day incl. report after registration
- ~ π BitBaan~~
AVC UnDroid- ~ π AMAaaS - Free Android Malware Analysis Service. A bare-metal service features static and dynamic analysis for Android applications. A product of π MalwarePot~~.
- ~ π AppCritique - Upload your Android APKs and receive comprehensive free security assessments~~
- ~ π NVISO ApkScan - sunsetting on Oct 31, 2019~~
Mobile Malware Sandbox- ~ π IBM Security AppScan Mobile Analyzer - not free~~
- ~ π Visual Threat - no longer an Android app analyzer~~
Tracedroid- ~ π habo - 10/day~~
CopperDroidSandDroidStowawayAnubisMobile app insightMobile-SandboxIjiamiComdroidAndroid SandboxForesafe- ~ π Dexter~~
MobiSec Eacus- ~ π Fireeye- max 60MB 15/day~~
- ~ π approver - Approver is a fully automated security analysis and risk assessment platform for Android and iOS apps. Not free.~~
?β
?π΄
Androwarn) - detect and warn the user about potential malicious behaviors developed by an Android application.1010β
251π΄
ApkAnalyser)?β
?π΄
APKInspector)- π Droid Intent Data Flow Analysis for Information Leakage
- π DroidLegacy
- π FlowDroid
- π Android Decompiler β not free
- π PSCout - A tool that extracts the permission specification from the Android OS source code using static analysis
- Amandroid
316β
76π΄
SmaliSCA) - Smali Static Code Analysis59β
9π΄
CFGScanDroid) - Scans and compares CFG against CFG of malicious applications100β
28π΄
Madrolyzer) - extracts actionable data like C&C, phone number etc.- π SPARTA - verifies (proves) that an app satisfies an information-flow security policy; built on the π Checker Framework
56β
13π΄
ConDroid) - Performs a combination of symbolic + concrete execution of the app51β
25π΄
DroidRA)132β
23π΄
RiskInDroid) - A tool for calculating the risk of Android apps based on their permissions, with an online demo available.422β
59π΄
SUPER) - Secure, Unified, Powerful and Extensible Rust Android Analyzer7506β
871π΄
ClassyShark) - Standalone binary inspection tool which can browse any Android executable and show important info.822β
129π΄
StaCoAn) - Cross-platform tool which aids developers, bug-bounty hunters, and ethical hackers in performing static code analysis on mobile applications. This tool was created with a big focus on usability and graphical guidance in the user interface.347β
107π΄
JAADAS) - Joint intraprocedural and interprocedural program analysis tool to find vulnerabilities in Android apps, built on Soot and Scala1274β
165π΄
Quark-Engine) - An Obfuscation-Neglect Android Malware Scoring System243β
39π΄
One Step Decompiler) - Android APK Decompilation for the Lazy4820β
475π΄
APKLeaks) - Scanning APK file for URIs, endpoints & secrets.200β
43π΄
Mobile Audit) - Web application for performing Static Analysis and detecting malware in Android APKs.?β
?π΄
Smali CFG generator)Several tools from PSU
?β
?π΄
QARK) - QARK by LinkedIn is for app developers to scan apps for security issues1120β
342π΄
AndroBugs)2938β
418π΄
Nogotofail)- ~ π Devknox - IDE plugin to build secure Android apps. Not maintained anymore.~~
- Android DBI frameowork
1091β
259π΄
Androl4b)- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis1378β
223π΄
House)- House: A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.16986β
3189π΄
Mobile-Security-Framework MobSF) - Mobile Security Framework is an intelligent, all-in-one open-source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.- π AppUse β custom build for penetration testing
752β
222π΄
Droidbox)3809β
769π΄
Drozer)- π Xposed - equivalent of doing Stub-based code injection but without any modifications to the binary
2792β
515π΄
Inspeckage) - Android Package Inspector - dynamic analysis with API hooks, start unexported activities, and more. (Xposed Module)409β
109π΄
Android Hooker) - Dynamic Java code instrumentation (requires the Substrate Framework)197β
37π΄
ProbeDroid) - Dynamic Java code instrumentation797β
169π΄
DECAF) - Dynamic Executable Code Analysis Framework based on QEMU (DroidScope is now an extension to DECAF)577β
135π΄
CuckooDroid) - Android extension for Cuckoo sandbox65β
11π΄
Mem) - Memory analysis of Android (root required)- Crowdroid β unable to find the actual tool
45β
14π΄
AuditdAndroid) β android port of auditd, not under active development anymore- π Android Security Evaluation Framework - not under active development anymore
37β
16π΄
Aurasium) β Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.205β
69π΄
Android Linux Kernel modules)- π Appie - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on a USB stick or smartphone. This is a one-stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
21β
10π΄
StaDynA) - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information.29β
19π΄
DroidAnalytics) - incomplete101β
22π΄
Vezir Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis619β
175π΄
MARA) - Mobile Application Reverse Engineering and Analysis Framework- Taintdroid - requires AOSP compilation
- π ARTist - a flexible open-source instrumentation and hybrid analysis framework for Android apps and Android's Java middleware. It is based on the Android Runtime's (ART) compiler and modifies code during on-device compilation.
278β
55π΄
Android Malware Sandbox)341β
61π΄
AndroPyTool) - a tool for extracting static and dynamic features from Android APKs. It combines different well-known Android app analysis tools such as DroidBox, FlowDroid, Strace, AndroGuard, or VirusTotal analysis.2560β
371π΄
Runtime Mobile Security (RMS)) - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime50β
9π΄
PAPIMonitor) β PAPIMonitor (Python API Monitor for Android apps) is a Python tool based on Frida for monitoring user-select APIs during the app execution.152β
29π΄
Android_application_analyzer) - The tool is used to analyze the content of the Android application in local storage.- π Decompiler.com - Online APK and Java decompiler
- ~ π Android Tamer - Virtual / Live Platform for Android Security Professionals~~
Android Malware Analysis Toolkit - (Linux distro) Earlier it use to be an online analyzer- ~ π Android Reverse Engineering β ARE (android reverse engineering) not under active development anymore~~
- ~ π ViaLab Community Edition~~
- ~ π Mercury~~
- ~ π Cobradroid β custom image for malware analysis~~
6286β
1066π΄
Smali/Baksmali) β apk decompilation33β
12π΄
emacs syntax coloring for smali files)- vim syntax coloring for smali files
596β
205π΄
AndBug)5178β
1055π΄
Androguard) β powerful, integrates well with other tools- π Apktool β really useful for compilation/decompilation (uses smali)
184β
77π΄
Android Framework for Exploitation)82β
34π΄
Bypass signature and permission checks for IPCs)132β
42π΄
Android OpenDebug) β make any application on the device debuggable (using cydia substrate).12182β
2096π΄
Dex2Jar) - dex to jar converter2732β
540π΄
Enjarify) - dex to jar converter from Google- π Dedexer
106β
39π΄
Fino)- π Frida - inject javascript to explore applications and a
171β
35π΄
GUI tool) for it - π Indroid β thread injection kit
- π IntentSniffer
463β
142π΄
Introspy)- Jad - Java decompiler
13889β
2374π΄
JD-GUI) - Java decompiler- CFR - Java decompiler
1968β
217π΄
Krakatau) - Java decompiler3399β
646π΄
FernFlower) - Java decompiler163β
33π΄
Redexer) β apk manipulation4434β
438π΄
Simplify Android deobfuscator)14572β
1138π΄
Bytecode viewer)20261β
2962π΄
Radare2)40733β
4793π΄
Jadx)1254β
166π΄
Dwarf) - GUI for reverse engineering698β
77π΄
Andromeda) - Another basic command-line reverse engineering tool3746β
342π΄
apk-mitm) - A CLI application that prepares Android APK files for HTTPS inspection109β
17π΄
Noia) - Simple Android application sandbox file browser tool1086β
285π΄
Obfuscapk) - Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code.12β
3π΄
ARMANDroid) - ARMAND (Anti-Repackaging through Multi-patternAnti-tampering based on Native Detection) is a novel anti-tampering protection scheme that embeds logic bombs and AT detection nodes directly in the apk file without needing their source code.10184β
935π΄
MVT (Mobile Verification Toolkit)) - a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices44β
6π΄
Dexmod) - tool to exemplify patching Dalvik bytecode in a DEX (Dalvik Executable) file, and assist in the static analysis of Android applications.- ~ π Procyon - Java decompiler~~
Smali viewer,?β
?π΄
ZjDroid)?β
?π΄
fork/mirror)Dare β .dex to .class converter
64β
21π΄
Radamsa Fuzzer)3036β
511π΄
Honggfuzz)58β
13π΄
An Android port of the Melkor ELF fuzzer)329β
112π΄
Media Fuzzing Framework for Android)38β
6π΄
AndroFuzz)100β
11π΄
QuarksLab's Android Fuzzing)- ~ π IntentFuzzer~~
71β
26π΄
FSquaDRA) - a tool for the detection of repackaged Android applications based on app resources hash comparison.
563β
204π΄
Google Play crawler (Java))879β
374π΄
Google Play crawler (Python))269β
84π΄
Google Play crawler (Node)) - get app details and download apps from the official Google Play Store.24β
6π΄
Aptoide downloader (Node)) - download apps from Aptoide third-party Android market16β
4π΄
Appland downloader (Node)) - download apps from Appland third-party Android market1131β
220π΄
PlaystoreDownloader) - PlaystoreDownloader is a tool for downloading Android applications directly from the Google Play Store. After an initial (one-time) configuration, applications can be downloaded by specifying their package name.- π APK Downloader Online Service to download APK from Playstore for specific Android Device Configuration
- ~ π Apkpure - Online apk downloader. Provides also its own app for downloading.~~
- smalihook
- AXMLPrinter2 - to convert binary XML files to human-readable XML files
250β
60π΄
adb autocomplete)35745β
3977π΄
mitmproxy)41β
16π΄
dockerfile/androguard)1014β
272π΄
Android Vulnerability Test Suite) - android-vts scans a device for set of vulnerabilities1550β
275π΄
AppMon)- AppMon is an automated framework for monitoring and tampering with system API calls of native macOS, iOS, and Android apps. It is based on Frida.674β
85π΄
Internal Blue) - Bluetooth experimentation framework based on Reverse Engineering of Broadcom Bluetooth Controllers195β
25π΄
Android Mobile Device Hardening) - AMDH scans and hardens the device's settings and lists harmful installed Apps based on permissions.- ~ π Android Device Security Database - Database of security features of Android devices~~
Opcodes table for quick referenceAPK-Downloader- seems dead nowDalvik opcodes
942β
277π΄
Damn Insecure Vulnerable Application (DIVA))61β
16π΄
Vuldroid)- ExploitMe Android Labs
238β
98π΄
GoatDroid)1239β
440π΄
Android InsecureBank)230β
151π΄
Insecureshop)625β
156π΄
Oversecured Vulnerable Android App (OVAA))
- π Exploit Database
166β
58π΄
Android security-related presentations)- π A good collection of static analysis papers
11557β
2282π΄
OWASP Mobile Security Testing Guide Manual)905β
136π΄
doridori/Android-Security-Reference)847β
202π΄
android app security checklist)4514β
1238π΄
Mobile App Pentest Cheat Sheet)- Android Reverse Engineering 101 by Daniele Altomare (Web Archive link)
- ~ π Mobile Security Reading Room - A reading room that contains well-categorized technical reading material about mobile penetration testing, mobile malware, mobile forensics, and all kind of mobile security-related topics~~
- π Android Security Bulletins
- π Android's reported security vulnerabilities
- π AOSP - Issue tracker
- π OWASP Mobile Top 10 2016
- π Exploit Database - click search
- π Vulnerability Google Doc
- π Google Android Security Teamβs Classifications for Potentially Harmful Applications (Malware)
- ~ π Android Devices Security Patch Status~~
- π androguard - Database Android Malware wiki
1034β
362π΄
Android Malware Github repo)- Android Malware Genome Project - contains 1260 malware samples categorized into 49 different malware families, free for research purposes.
- Contagio Mobile Malware Mini Dump
- π Drebin
- π Hudson Rock - Free cybercrime intelligence toolset that can indicate if a specific APK package was compromised in an Infostealer malware attack.
- Kharon Malware Dataset - 7 malware which have been reverse-engineered and documented
- π Android Adware and General Malware Dataset
- π AndroZoo - AndroZoo is a growing collection of Android Applications collected from several sources, including the official Google Play app market.
Android PRAGuard Dataset - The dataset contains 10479 samples, obtained by obfuscating the MalGenome and the Contagio Minidump datasets with seven different obfuscation techniques.Admire
- π Android - reporting security issues
1408β
299π΄
Android Reports and Resources) - List of Android Hackerone disclosed reports and other resources
Your contributions are always welcome!
7992β
1434π΄
ashishb/android-security-awesome)