A collection of android security related resources.
A lot of work is happening in academia and industry on tools to perform dynamic analysis, static analysis and reverse engineering of android apps.
- AndroTotal
- Anubis
- App 360 scan
- CopperDroid
- Comdroid
- Dexter
- Foresafe
- Mobile app insight
- Mobile-Sandbox
- Sandroid
- Tracedroid
- Visual Threat
- Android Sandbox
- Mobile Malware Sandbox
- Stowaway – seems to be dead now
- Android Decompiler – not free
- Androwarn
- ApkAnalyser
- APKInspector
- Droid Intent Data Flow Analysis for Information Leakage
- Several tools from PSU
- Smali CFG generator
- FlowDroid
- Android DBI frameowork
- Android Malware Analysis Toolkit - (linux distro) Earlier it use to be an online analyzer at http://dunkelheit.com.br/amat/analysis/index_en.html
- Android Reverse Engineering – ARE (android reverse engineering) does not seem to be under active development anymore
- Android Security Evaluation Framework
- AppUse – custom build for pentesting
- AuditdAndroid – android port of auditd, does not seem to be active development anymore
- Cobradroid – custom image for malware analysis
- Crowdroid – unable to find the actual tool
- Droidbox
- Mercury
- Drozer
- Taintdroid - requires AOSP compilation
- Xposed - equivalent of doing Stub based code injection but without any modifications to the binary
- ViaLab Community Edition
- Ijiami (Chinese)
- Aurasium – rewrites the android app to add security policy, seems dead now
- [Android Hooker] (https://github.com/AndroidHooker/hooker) - API Hooking of java methods triggered by any Android application (requires the Substrate Framework)
- Smali/Baksmali – apk decompilation
- emacs syntax coloring for smali files
- vim syntax coloring for smali files
- AndBug
- Androguard – powerful, integrates well with other tools
- Apktool – really useful for compilation/decompilation (uses smali)
- Android Framework for Exploitation
- Bypass signature and permission checks for IPCs
- Android OpenDebug – make any application on device debuggable (using cydia substrate).
- Dare – .dex to .class converter
- Dex2Jar
- Dedexer
- Fino
- Indroid – thread injection kit
- IntentFuzzer
- IntentSniffer
- Introspy
- Jad - Java decompiler
- JD-GUI - Java decompiler
- CFR - Java decompiler
- Krakatau - Java decompiler
- Procyon - Java decompiler
- Redexer – apk manipulation
- Smali viewer
- ZjDroid
- Simplify Android deobfuscator
- Vulnerability Google doc
- [Root Exploits (from Drozer issue #56)(WithSecureLabs/drozer#56)
- smalihook
- APK-Downloader
- AXMLPrinter2 - to convert binary XML files to human-readable XML files
- An Android port of the melkor ELF fuzzer
- adb autocomplete
- Dalvik opcodes
- Opcodes table for quick reference
- A good collection of static analysis papers
- ExploitMe - for practice
- GoatDroid - for practice
- Android Labs - for practice
- mitmproxy
Other amazingly awesome lists can be found in the awesome-awesomeness list.
Your contributions are always welcome!