Skip to content

Latest commit

 

History

History
202 lines (170 loc) · 14.8 KB

README.md

File metadata and controls

202 lines (170 loc) · 14.8 KB

Collection of Android security related resources

A collection of android security related resources.

A lot of work is happening in academia and industry on tools to perform dynamic analysis, static analysis and reverse engineering of android apps.

##Books

  1. http://amzn.to/2jkFvjg Android Security Internals: An In-Depth Guide to Android's Security Architecture
  2. http://amzn.to/2jkK0uf Android Security: Attacks and Defenses
  3. http://amzn.to/2jLHqd6 Android Security Cookbook
  4. http://amzn.to/2jLL5HR Android Hacker's Handbook
  5. http://amzn.to/2jLPY3L Android Forensics: Investigation, Analysis and Mobile Security for Google Android
  6. http://amzn.to/2ipWhhu Android Apps Security
  7. http://amzn.to/2iq3nCk Android Malware and Analysis
  8. http://amzn.to/2jkBlrR Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation
  9. http://amzn.to/2jkJIU7 The Mobile Application Hacker's Handbook
  10. http://amzn.to/2iyIXW8 Android Application Security Essentials
  11. http://amzn.to/2jLJvWs Learning Pentesting for Android Devices

ONLINE ANALYZERS

  1. AndroTotal

STATIC ANALYSIS TOOLS

  1. Androwarn - detect and warn the user about potential malicious behaviours developped by an Android application.

APP VULNERABILITY SCANNERS

  1. QARK - QARK by LinkedIn is for app developers to scan app for security issues

DYNAMIC ANALYSIS TOOLS

  1. Android DBI frameowork
  2. Androl4b- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
  • Android Malware Analysis Toolkit - (linux distro) Earlier it use to be an online analyzer
  • Mobile-Security-Framework MobSF - Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.
  • AppUse – custom build for pentesting
  • Cobradroid – custom image for malware analysis
  • ViaLab Community Edition
  • Droidbox
  • Mercury
  • Drozer
  • Xposed - equivalent of doing Stub based code injection but without any modifications to the binary
  • Inspeckage - Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)
  • Android Hooker - Dynamic Java code instrumentation (requires the Substrate Framework)
  • ProbeDroid - Dynamic Java code instrumentation
  • Android Tamer - Virtual / Live Platform for Android Security Professionals
  • DECAF - Dynamic Executable Code Analysis Framework based on QEMU (DroidScope is now an extension to DECAF)
  • CuckooDroid - Android extension for Cuckoo sandbox
  • Mem - Memory analysis of Android (root required)
  • Crowdroid – unable to find the actual tool
  • AuditdAndroid – android port of auditd, not under active development anymore
  • Android Security Evaluation Framework - not under active development anymore
  • Android Reverse Engineering – ARE (android reverse engineering) not under active development anymore
  • Aurasium – Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.
  • Android Linux Kernel modules
  • Appie - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment.It is completely portable and can be carried on USB stick or smartphone.This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
  • StaDynA - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information.
  • DroidAnalytics - incomplete
  • Vezir Project - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
  • MARA - Mobile Application Reverse engineering and Analysis Framework
  • NowSecure Lab Automated - Enterprise tool for mobile app security testing both Android and iOS mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes.
  • Taintdroid - requires AOSP compilation

REVERSE ENGINEERING

  1. Smali/Baksmali – apk decompilation

FUZZ TESTING

  1. IntentFuzzer

APP REPACKAGING DETECTORS

  1. FSquaDRA - a tool for detection of repackaged Android applications based on app resources hash comparison.

EXPLOITABLE VULNERABILITIES

  1. Vulnerability Google Doc

SAMPLE SOURCES

  1. Contagio Mini Dump
  2. Android Malware Github repo

READING MATERIAL

  1. Android Security (and Not) Internals

MARKET CRAWLERS

  1. Google play crawler (Java)

MISC TOOLS

  1. smalihook

TUTORIALS

  1. Android Reverse Engineering 101 by Daniele Altomare

Please have a look at