update lists

This commit is contained in:
2025-07-18 22:22:32 +02:00
parent 55bed3b4a1
commit 5916c5c074
3078 changed files with 331679 additions and 357255 deletions

View File

@@ -4,7 +4,8 @@ alt="Awesome" /></h1>
<p><a
href="https://github.com/ashishb/android-security-awesome/actions/workflows/validate-links.yml"><img
src="https://github.com/ashishb/android-security-awesome/actions/workflows/validate-links.yml/badge.svg"
alt="Link Liveness Checker" /></a> <a
alt="Link Liveness Checker" /></a></p>
<p><a
href="https://github.com/ashishb/android-security-awesome/actions/workflows/lint-shell-script.yaml"><img
src="https://github.com/ashishb/android-security-awesome/actions/workflows/lint-shell-script.yaml/badge.svg"
alt="Lint Shell scripts" /></a> <a
@@ -13,7 +14,12 @@ src="https://github.com/ashishb/android-security-awesome/actions/workflows/lint-
alt="Lint Markdown" /></a> <a
href="https://github.com/ashishb/android-security-awesome/actions/workflows/lint-yaml.yaml"><img
src="https://github.com/ashishb/android-security-awesome/actions/workflows/lint-yaml.yaml/badge.svg"
alt="Lint YAML" /></a></p>
alt="Lint YAML" /></a> <a
href="https://github.com/ashishb/android-security-awesome/actions/workflows/lint-github-actions.yaml"><img
src="https://github.com/ashishb/android-security-awesome/actions/workflows/lint-github-actions.yaml/badge.svg"
alt="Lint GitHub Actions" /></a> <img
src="https://img.shields.io/github/contributors/ashishb/android-security-awesome"
alt="GitHub contributors" /></p>
<p>A collection of Android security-related resources.</p>
<ol type="1">
<li><a href="#tools">Tools</a></li>
@@ -35,15 +41,15 @@ Android and iOS mobile apps. Lab Automated features dynamic and static
analysis on real devices in the cloud to return results in minutes. Not
free</li>
<li><a href="https://appdetonator.run/">App Detonator</a> - Detonate APK
binary to provide source code level details including app author,
binary to provide source code level details, including app author,
signature, build, and manifest information. 3 Analysis/day free
quota.</li>
<li><a href="https://beta.pithus.org/">Pithus</a> - Open-Source APK
analyzer. Still in Beta for the moment and limited to static analysis
for the moment. Possible to hunt malware with Yara rules. More <a
analyzer. Still in Beta and limited to static analysis for the moment.
It is possible to hunt malware with Yara rules. More <a
href="https://beta.pithus.org/about/">here</a>.</li>
<li><a href="https://oversecured.com/">Oversecured</a> - Enterprise
vulnerability scanner for Android and iOS apps, it offers app owners and
vulnerability scanner for Android and iOS apps; it offers app owners and
developers the ability to secure each new version of a mobile app by
integrating Oversecured into the development process. Not free.</li>
<li><a href="https://appsweep.guardsquare.com/">AppSweep by
@@ -52,10 +58,10 @@ developers</li>
<li><a href="https://koodous.com">Koodous</a> - Performs static/dynamic
malware analysis over a vast repository of Android samples and checks
them against public and private Yara rules.</li>
<li><a href="https://www.immuniweb.com/mobile/">Immuniweb</a>. Does a
“OWASP Mobile Top 10 Test”, “Mobile App Privacy Check” and an
application permissions test. Free tier is 4 tests per day incl. report
after registration</li>
<li><a href="https://www.immuniweb.com/mobile/">Immuniweb</a>. Does an
“OWASP Mobile Top 10 Test”, “Mobile App Privacy Check”, and an
application permissions test. The free tier is 4 tests per day,
including report after registration</li>
<li><del><a href="https://malab.bitbaan.com/">BitBaan</a></del></li>
<li><del><a href="http://undroid.av-comparatives.info/">AVC
UnDroid</a></del></li>
@@ -112,8 +118,8 @@ by an Android application.</li>
href="https://github.com/sonyxperiadev/ApkAnalyser">ApkAnalyser</a></li>
<li><a
href="https://github.com/honeynet/apkinspector/">APKInspector</a></li>
<li><a href="https://www.cert.org/secure-coding/tools/didfail.cfm">Droid
Intent Data Flow Analysis for Information Leakage</a></li>
<li><a href="https://insights.sei.cmu.edu/library/didfail/">Droid Intent
Data Flow Analysis for Information Leakage</a></li>
<li><a href="https://bitbucket.org/srl/droidlegacy">DroidLegacy</a></li>
<li><a
href="https://blogs.uni-paderborn.de/sse/tools/flowdroid/">FlowDroid</a></li>
@@ -126,14 +132,10 @@ source code using static analysis</li>
<li><a href="https://github.com/dorneanu/smalisca">SmaliSCA</a> - Smali
Static Code Analysis</li>
<li><a href="https://github.com/douggard/CFGScanDroid">CFGScanDroid</a>
- Scans and compares CFG against CFG of malicious applications</li>
- Scans and compares the CFG against the CFG of malicious
applications</li>
<li><a href="https://github.com/maldroid/maldrolyzer">Madrolyzer</a> -
extracts actionable data like C&amp;C, phone number etc.</li>
<li><a href="https://www.cs.washington.edu/sparta">SPARTA</a> - verifies
(proves) that an app satisfies an information-flow security policy;
built on the <a
href="https://types.cs.washington.edu/checker-framework/">Checker
Framework</a></li>
<li><a href="https://github.com/JulianSchuette/ConDroid">ConDroid</a> -
Performs a combination of symbolic + concrete execution of the app</li>
<li><a
@@ -143,13 +145,13 @@ href="https://github.com/ClaudiuGeorgiu/RiskInDroid">RiskInDroid</a> - A
tool for calculating the risk of Android apps based on their
permissions, with an online demo available.</li>
<li><a href="https://github.com/SUPERAndroidAnalyzer/super">SUPER</a> -
Secure, Unified, Powerful and Extensible Rust Android Analyzer</li>
Secure, Unified, Powerful, and Extensible Rust Android Analyzer</li>
<li><a
href="https://github.com/google/android-classyshark">ClassyShark</a> -
Standalone binary inspection tool which can browse any Android
executable and show important info.</li>
href="https://github.com/google/android-classyshark">ClassyShark</a> - A
Standalone binary inspection tool that can browse any Android executable
and show important info.</li>
<li><a href="https://github.com/vincentcox/StaCoAn">StaCoAn</a> -
Cross-platform tool which aids developers, bug-bounty hunters, and
Cross-platform tool that aids developers, bug-bounty hunters, and
ethical hackers in performing static code analysis on mobile
applications. This tool was created with a big focus on usability and
graphical guidance in the user interface.</li>
@@ -170,6 +172,11 @@ Android APKs.</li>
generator</a></del></li>
<li><del><a href="http://siis.cse.psu.edu/tools.html">Several tools from
PSU</a></del></li>
<li><del><a href="https://www.cs.washington.edu/sparta">SPARTA</a> -
verifies (proves) that an app satisfies an information-flow security
policy; built on the <a
href="https://types.cs.washington.edu/checker-framework/">Checker
Framework</a></del></li>
</ol>
<h3 id="app-vulnerability-scanners">App Vulnerability Scanners</h3>
<ol type="1">
@@ -226,20 +233,14 @@ href="http://www.ida.liu.se/labs/rtslab/publications/2011/spsm11-burguera.pdf">C
unable to find the actual tool</li>
<li><a
href="https://github.com/nwhusted/AuditdAndroid">AuditdAndroid</a>
android port of auditd, not under active development anymore</li>
Android port of auditd, not under active development anymore</li>
<li><a href="https://code.google.com/p/asef/">Android Security
Evaluation Framework</a> - not under active development anymore</li>
<li><a href="https://github.com/xurubin/aurasium">Aurasium</a>
Practical security policy enforcement for Android apps via bytecode
rewriting and in-place reference monitor.</li>
rewriting and in-place reference monitoring.</li>
<li><a href="https://github.com/strazzere/android-lkms">Android Linux
Kernel modules</a></li>
<li><a href="https://manifestsecurity.com/appie/">Appie</a> - Appie is a
software package that has been pre-configured to function as an Android
Pentesting Environment. It is completely portable and can be carried on
a USB stick or smartphone. This is a one-stop answer for all the tools
needed in Android Application Security Assessment and an awesome
alternative to existing virtual machines.</li>
<li><a href="https://github.com/zyrikby/StaDynA">StaDynA</a> - a system
supporting security app analysis in the presence of dynamic code update
features (dynamic class loading and reflection). This tool combines
@@ -279,16 +280,30 @@ href="https://github.com/NotSoSecure/android_application_analyzer">Android_appli
local storage.</li>
<li><a href="https://www.decompiler.com/">Decompiler.com</a> - Online
APK and Java decompiler</li>
<li><a href="https://github.com/fkie-cad/friTap">friTap</a>- Intercept
SSL/TLS connections with Frida; Allows TLS key extraction and decryption
of TLS payload as PCAP on Android in real-time.</li>
<li><a href="https://github.com/RaffaDNDM/HacknDroid">HacknDroid</a> - A
tool designed to automate various Mobile Application Penetration Testing
(MAPT) tasks and facilitate interaction with Android devices.</li>
<li><a href="https://github.com/mesquidar/adbsploit">adbsploit</a> -
tools for exploiting device via ADB</li>
<li><del><a href="https://manifestsecurity.com/appie/">Appie</a> - Appie
is a software package that has been pre-configured to function as an
Android Pentesting Environment. It is completely portable and can be
carried on a USB stick or smartphone. This is a one-stop answer for all
the tools needed in Android Application Security Assessment and an
awesome alternative to existing virtual machines.</del></li>
<li><del><a href="https://androidtamer.com/">Android Tamer</a> - Virtual
/ Live Platform for Android Security Professionals</del></li>
<li><del><a
href="http://www.mobilemalware.com.br/amat/download.html">Android
Malware Analysis Toolkit</a> - (Linux distro) Earlier it use to be an <a
href="http://dunkelheit.com.br/amat/analysis/index_en.php">online
Malware Analysis Toolkit</a> - (Linux distro) Earlier, it used to be an
<a href="http://dunkelheit.com.br/amat/analysis/index_en.php">online
analyzer</a></del></li>
<li><del><a
href="https://redmine.honeynet.org/projects/are/wiki">Android Reverse
Engineering</a> ARE (android reverse engineering) not under active
Engineering</a> ARE (android reverse engineering) is not under active
development anymore</del></li>
<li><del><a
href="https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/">ViaLab
@@ -326,7 +341,7 @@ jar converter</li>
jar converter from Google</li>
<li><a href="https://sourceforge.net/projects/dedexer/">Dedexer</a></li>
<li><a href="https://github.com/sysdream/fino">Fino</a></li>
<li><a href="https://www.frida.re/">Frida</a> - inject javascript to
<li><a href="https://www.frida.re/">Frida</a> - inject JavaScript to
explore applications and a <a
href="https://github.com/antojoseph/diff-gui">GUI tool</a> for it</li>
<li><a href="https://bitbucket.org/aseemjakhar/indroid">Indroid</a>
@@ -362,21 +377,30 @@ inspection</li>
<li><a href="https://github.com/0x742/noia">Noia</a> - Simple Android
application sandbox file browser tool</li>
<li><a href="https://github.com/ClaudiuGeorgiu/Obfuscapk">Obfuscapk</a>
- Obfuscapk is a modular Python tool for obfuscating Android apps
without needing their source code.</li>
Obfuscapk is a modular Python tool for obfuscating Android apps
without requiring their source code.</li>
<li><a
href="https://github.com/Mobile-IoT-Security-Lab/ARMANDroid">ARMANDroid</a>
- ARMAND (Anti-Repackaging through Multi-patternAnti-tampering based on
Native Detection) is a novel anti-tampering protection scheme that
- ARMAND (Anti-Repackaging through Multi-pattern, Anti-tampering based
on Native Detection) is a novel anti-tampering protection scheme that
embeds logic bombs and AT detection nodes directly in the apk file
without needing their source code.</li>
<li><a href="https://github.com/mvt-project/mvt">MVT (Mobile
Verification Toolkit)</a> - a collection of utilities to simplify and
automate the process of gathering forensic traces helpful to identify a
potential compromise of Android and iOS devices</li>
<li><a href="https://github.com/google/dexmod">Dexmod</a> - tool to
exemplify patching Dalvik bytecode in a DEX (Dalvik Executable) file,
and assist in the static analysis of Android applications.</li>
<li><a href="https://github.com/google/dexmod">Dexmod</a> - a tool to
exemplify patching Dalvik bytecode in a DEX (Dalvik Executable) file and
assist in the static analysis of Android applications.</li>
<li><a
href="https://github.com/giacomoferretti/odex-patcher">odex-patcher</a>
- Run arbitrary code by patching OAT files</li>
<li><a
href="https://github.com/AzeemIdrisi/PhoneSploit-Pro">PhoneSpolit-Pro</a>
- An all-in-one hacking tool to remotely exploit Android devices using
ADB and Metasploit Framework to get a Meterpreter session.</li>
<li><a href="https://github.com/APKLab/APKLab">APKLab</a> - plugin for
VS code to analyze APKs</li>
<li><del><a
href="https://bitbucket.org/mstrobel/procyon/wiki/Java%20Decompiler">Procyon</a>
- Java decompiler</del></li>
@@ -408,8 +432,8 @@ href="https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/">IntentFuz
<h3 id="app-repackaging-detectors">App Repackaging Detectors</h3>
<ol type="1">
<li><a href="https://github.com/zyrikby/FSquaDRA">FSquaDRA</a> - a tool
for the detection of repackaged Android applications based on app
resources hash comparison.</li>
for detecting repackaged Android applications based on app resources
hash comparison.</li>
</ol>
<h3 id="market-crawlers">Market Crawlers</h3>
<ol type="1">
@@ -433,10 +457,10 @@ directly from the Google Play Store. After an initial (one-time)
configuration, applications can be downloaded by specifying their
package name.</li>
<li><a href="https://apkcombo.com/apk-downloader/">APK Downloader</a>
Online Service to download APK from Playstore for specific Android
Device Configuration</li>
Online Service to download APK from the Play Store for a specific
Android Device Configuration</li>
<li><del><a href="https://apkpure.com/">Apkpure</a> - Online apk
downloader. Provides also its own app for downloading.</del></li>
downloader. Also, it provides its own app for downloading.</del></li>
</ol>
<h3 id="misc-tools">Misc Tools</h3>
<ol type="1">
@@ -457,11 +481,17 @@ vulnerabilities</li>
an automated framework for monitoring and tampering with system API
calls of native macOS, iOS, and Android apps. It is based on Frida.</li>
<li><a href="https://github.com/seemoo-lab/internalblue">Internal
Blue</a> - Bluetooth experimentation framework based on Reverse
Blue</a> - Bluetooth experimentation framework based on the Reverse
Engineering of Broadcom Bluetooth Controllers</li>
<li><a href="https://github.com/SecTheTech/AMDH">Android Mobile Device
Hardening</a> - AMDH scans and hardens the devices settings and lists
harmful installed Apps based on permissions.</li>
<li><a
href="https://github.com/AndroidDumps/Firmware_extractor">Firmware
Extractor</a> - Extract given archive to images</li>
<li><a href="https://github.com/R0rt1z2/kaeru">ARMv7 payload that
provides arbitrary code execution on MediaTek bootloaders</a><br />
</li>
<li><del><a
href="https://www.android-device-security.org/client/datatable">Android
Device Security Database</a> - Database of security features of Android
@@ -511,7 +541,7 @@ good collection of static analysis papers</a></li>
<h3 id="books">Books</h3>
<ol type="1">
<li><a
href="https://www.securecoding.cert.org/confluence/display/android/Android+Secure+Coding+Standard">SEI
href="https://wiki.sei.cmu.edu/confluence/display/android/Android+Secure+Coding+Standard">SEI
CERT Android Secure Coding Standard</a></li>
</ol>
<h3 id="others">Others</h3>
@@ -527,12 +557,12 @@ app security checklist</a></li>
href="https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet">Mobile
App Pentest Cheat Sheet</a></li>
<li><a
href="http://web.archive.org/web/20180721134044/http://www.fasteque.com:80/android-reverse-engineering-101-part-1/">Android
href="https://web.archive.org/web/20180721134044/http://www.fasteque.com:80/android-reverse-engineering-101-part-1/">Android
Reverse Engineering 101 by Daniele Altomare (Web Archive link)</a></li>
<li><del><a href="https://mobile-security.zeef.com">Mobile Security
Reading Room</a> - A reading room that contains well-categorized
technical reading material about mobile penetration testing, mobile
malware, mobile forensics, and all kind of mobile security-related
malware, mobile forensics, and all kinds of mobile security-related
topics</del></li>
</ol>
<h2 id="exploitsvulnerabilitiesbugs">Exploits/Vulnerabilities/Bugs</h2>
@@ -544,9 +574,6 @@ Security Bulletins</a></li>
href="https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/Google-Android.html">Androids
reported security vulnerabilities</a></li>
<li><a
href="https://code.google.com/p/android/issues/list?can=2&amp;q=priority=Critical&amp;sort=-opened">AOSP
- Issue tracker</a></li>
<li><a
href="https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10">OWASP
Mobile Top 10 2016</a></li>
<li><a
@@ -570,12 +597,17 @@ href="https://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares">androgu
- Database Android Malware wiki</a></li>
<li><a href="https://github.com/ashishb/android-malware">Android Malware
Github repo</a></li>
<li><a href="http://www.malgenomeproject.org/policy.html">Android
Malware Genome Project</a> - contains 1260 malware samples categorized
into 49 different malware families, free for research purposes.</li>
<li><a href="http://www.malgenomeproject.org/">Android Malware Genome
Project</a> - contains 1260 malware samples categorized into 49
different malware families, free for research purposes.</li>
<li><a href="http://contagiominidump.blogspot.com">Contagio Mobile
Malware Mini Dump</a></li>
<li><a href="https://www.sec.tu-bs.de/~danarp/drebin/">Drebin</a></li>
<li><a
href="https://www.hudsonrock.com/threat-intelligence-cybercrime-tools">Hudson
Rock</a> - A Free cybercrime intelligence toolset that can indicate if a
specific APK package was compromised in an Infostealer malware
attack.</li>
<li><a href="http://kharon.gforge.inria.fr/dataset/">Kharon Malware
Dataset</a> - 7 malware which have been reverse-engineered and
documented</li>
@@ -583,8 +615,8 @@ documented</li>
href="https://www.unb.ca/cic/datasets/android-adware.html">Android
Adware and General Malware Dataset</a></li>
<li><a href="https://androzoo.uni.lu/">AndroZoo</a> - AndroZoo is a
growing collection of Android Applications collected from several
sources, including the official Google Play app market.</li>
growing Android application collection from several sources, including
the official Google Play app market.</li>
<li><del><a
href="http://pralab.diee.unica.it/en/AndroidPRAGuardDataset">Android
PRAGuard Dataset</a> - The dataset contains 10479 samples, obtained by
@@ -611,3 +643,19 @@ and other resources</li>
</ol>
<h2 id="contributing">Contributing</h2>
<p>Your contributions are always welcome!</p>
<h2 id="citation">📖 Citation</h2>
<div class="sourceCode" id="cb1"><pre
class="sourceCode bibtex"><code class="sourceCode bibtex"><span id="cb1-1"><a href="#cb1-1" aria-hidden="true" tabindex="-1"></a><span class="va">@misc</span>{</span>
<span id="cb1-2"><a href="#cb1-2" aria-hidden="true" tabindex="-1"></a> <span class="ot">author</span> = {<span class="ot">Ashish</span> <span class="ot">Bhatia</span> - <span class="ot">ashishb</span>.<span class="ot">net</span>}<span class="co">,</span></span>
<span id="cb1-3"><a href="#cb1-3" aria-hidden="true" tabindex="-1"></a><span class="co"> title = {The most comprehensive collection of Android Security related resources},</span></span>
<span id="cb1-4"><a href="#cb1-4" aria-hidden="true" tabindex="-1"></a><span class="co"> year = {2025},</span></span>
<span id="cb1-5"><a href="#cb1-5" aria-hidden="true" tabindex="-1"></a><span class="co"> publisher = {GitHub},</span></span>
<span id="cb1-6"><a href="#cb1-6" aria-hidden="true" tabindex="-1"></a><span class="co"> journal = {GitHub repository},</span></span>
<span id="cb1-7"><a href="#cb1-7" aria-hidden="true" tabindex="-1"></a><span class="co"> howpublished = {\url{https://github.com/ashishb/android-security-awesome}}</span></span>
<span id="cb1-8"><a href="#cb1-8" aria-hidden="true" tabindex="-1"></a><span class="co">}</span></span></code></pre></div>
<p>This repository has been cited in <a
href="https://scholar.google.com/scholar?q=github.com%2Fashishb%2Fandroid-security-awesome">10+
papers</a></p>
<p><a
href="https://github.com/ashishb/android-security-awesome">androidsecurity.md
Github</a></p>