android-security-awesome 

A collection of Android security-related resources.
- Tools
- Academic/Research/Publications/Books
- Exploits/Vulnerabilities/Bugs
Online Analyzers
- AndroTotal
- Appknox - not free
- Virustotal - max
128MB
- Fraunhofer App-ray - not free
- NowSecure
Lab Automated - Enterprise tool for mobile app security testing both
Android and iOS mobile apps. Lab Automated features dynamic and static
analysis on real devices in the cloud to return results in minutes. Not
free
- App Detonator - Detonate APK
binary to provide source code level details including app author,
signature, build, and manifest information. 3 Analysis/day free
quota.
- Pithus - Open-Source APK
analyzer. Still in Beta for the moment and limited to static analysis
for the moment. Possible to hunt malware with Yara rules. More here.
- Oversecured - Enterprise
vulnerability scanner for Android and iOS apps, it offers app owners and
developers the ability to secure each new version of a mobile app by
integrating Oversecured into the development process. Not free.
- AppSweep by
Guardsquare - Free, fast Android application security testing for
developers
- Koodous - Performs static/dynamic
malware analysis over a vast repository of Android samples and checks
them against public and private Yara rules.
- Immuniweb. Does a
“OWASP Mobile Top 10 Test”, “Mobile App Privacy Check” and an
application permissions test. Free tier is 4 tests per day incl. report
after registration
BitBaan
AVC
UnDroid
AMAaaS - Free Android Malware
Analysis Service. A bare-metal service features static and dynamic
analysis for Android applications. A product of MalwarePot.
AppCritique -
Upload your Android APKs and receive comprehensive free security
assessments
NVISO ApkScan -
sunsetting on Oct 31, 2019
Mobile
Malware Sandbox
IBM
Security AppScan Mobile Analyzer - not free
Visual Threat - no
longer an Android app analyzer
Tracedroid
habo - 10/day
CopperDroid
SandDroid
Stowaway
Anubis
Mobile app
insight
Mobile-Sandbox
Ijiami
Comdroid
Android
Sandbox
Foresafe
Dexter
MobiSec
Eacus
Fireeye- max 60MB
15/day
approver -
Approver is a fully automated security analysis and risk assessment
platform for Android and iOS apps. Not free.
- Androwarn -
detect and warn the user about potential malicious behaviors developed
by an Android application.
- ApkAnalyser
- APKInspector
- Droid
Intent Data Flow Analysis for Information Leakage
- DroidLegacy
- FlowDroid
- Android Decompiler – not
free
- PSCout - A
tool that extracts the permission specification from the Android OS
source code using static analysis
- Amandroid
- SmaliSCA - Smali
Static Code Analysis
- CFGScanDroid
- Scans and compares CFG against CFG of malicious applications
- Madrolyzer -
extracts actionable data like C&C, phone number etc.
- SPARTA - verifies
(proves) that an app satisfies an information-flow security policy;
built on the Checker
Framework
- ConDroid -
Performs a combination of symbolic + concrete execution of the app
- DroidRA
- RiskInDroid - A
tool for calculating the risk of Android apps based on their
permissions, with an online demo available.
- SUPER -
Secure, Unified, Powerful and Extensible Rust Android Analyzer
- ClassyShark -
Standalone binary inspection tool which can browse any Android
executable and show important info.
- StaCoAn -
Cross-platform tool which aids developers, bug-bounty hunters, and
ethical hackers in performing static code analysis on mobile
applications. This tool was created with a big focus on usability and
graphical guidance in the user interface.
- JAADAS - Joint
intraprocedural and interprocedural program analysis tool to find
vulnerabilities in Android apps, built on Soot and Scala
- Quark-Engine -
An Obfuscation-Neglect Android Malware Scoring System
- One Step Decompiler
- Android APK Decompilation for the Lazy
- APKLeaks -
Scanning APK file for URIs, endpoints & secrets.
- Mobile Audit -
Web application for performing Static Analysis and detecting malware in
Android APKs.
Smali CFG
generator
Several tools from
PSU
App Vulnerability Scanners
- QARK - QARK by
LinkedIn is for app developers to scan apps for security issues
- AndroBugs
- Nogotofail
Devknox - IDE plugin to build
secure Android apps. Not maintained anymore.
- Android
DBI frameowork
- Androl4b- A Virtual
Machine For Assessing Android applications, Reverse Engineering and
Malware Analysis
- House- House: A
runtime mobile application analysis toolkit with a Web GUI, powered by
Frida, written in Python.
- Mobile-Security-Framework
MobSF - Mobile Security Framework is an intelligent, all-in-one
open-source mobile application (Android/iOS) automated pen-testing
framework capable of performing static, dynamic analysis and web API
testing.
- AppUse – custom build
for penetration testing
- Droidbox
- Drozer
- Xposed
- equivalent of doing Stub-based code injection but without any
modifications to the binary
- Inspeckage -
Android Package Inspector - dynamic analysis with API hooks, start
unexported activities, and more. (Xposed Module)
- Android Hooker
- Dynamic Java code instrumentation (requires the Substrate
Framework)
- ProbeDroid -
Dynamic Java code instrumentation
- DECAF - Dynamic
Executable Code Analysis Framework based on QEMU (DroidScope is now an
extension to DECAF)
- CuckooDroid
- Android extension for Cuckoo sandbox
- Mem -
Memory analysis of Android (root required)
- Crowdroid
– unable to find the actual tool
- AuditdAndroid –
android port of auditd, not under active development anymore
- Android Security
Evaluation Framework - not under active development anymore
- Aurasium –
Practical security policy enforcement for Android apps via bytecode
rewriting and in-place reference monitor.
- Android Linux
Kernel modules
- Appie - Appie is a
software package that has been pre-configured to function as an Android
Pentesting Environment. It is completely portable and can be carried on
a USB stick or smartphone. This is a one-stop answer for all the tools
needed in Android Application Security Assessment and an awesome
alternative to existing virtual machines.
- StaDynA - a system
supporting security app analysis in the presence of dynamic code update
features (dynamic class loading and reflection). This tool combines
static and dynamic analysis of Android applications in order to reveal
the hidden/updated behavior and extend static analysis results with this
information.
- DroidAnalytics
- incomplete
- Vezir
Project - Virtual Machine for Mobile Application Pentesting and
Mobile Malware Analysis
- MARA -
Mobile Application Reverse Engineering and Analysis Framework
- Taintdroid - requires AOSP
compilation
- ARTist - a flexible
open-source instrumentation and hybrid analysis framework for Android
apps and Android’s Java middleware. It is based on the Android Runtime’s
(ART) compiler and modifies code during on-device compilation.
- Android
Malware Sandbox
- AndroPyTool - a
tool for extracting static and dynamic features from Android APKs. It
combines different well-known Android app analysis tools such as
DroidBox, FlowDroid, Strace, AndroGuard, or VirusTotal analysis.
- Runtime
Mobile Security (RMS) - is a powerful web interface that helps you
to manipulate Android and iOS Apps at Runtime
- PAPIMonitor –
PAPIMonitor (Python API Monitor for Android apps) is a Python tool based
on Frida for monitoring user-select APIs during the app execution.
- Android_application_analyzer
- The tool is used to analyze the content of the Android application in
local storage.
- Decompiler.com - Online
APK and Java decompiler
Android Tamer - Virtual
/ Live Platform for Android Security Professionals
Android
Malware Analysis Toolkit - (Linux distro) Earlier it use to be an online
analyzer
Android Reverse
Engineering – ARE (android reverse engineering) not under active
development anymore
ViaLab
Community Edition
Mercury
Cobradroid –
custom image for malware analysis
Reverse Engineering
- Smali/Baksmali –
apk decompilation
- emacs syntax
coloring for smali files
- vim syntax coloring for
smali files
- AndBug
- Androguard –
powerful, integrates well with other tools
- Apktool –
really useful for compilation/decompilation (uses smali)
- Android Framework for
Exploitation
- Bypass
signature and permission checks for IPCs
- Android
OpenDebug – make any application on the device debuggable (using
cydia substrate).
- Dex2Jar - dex to
jar converter
- Enjarify - dex to
jar converter from Google
- Dedexer
- Fino
- Frida - inject javascript to
explore applications and a GUI tool for it
- Indroid –
thread injection kit
- IntentSniffer
- Introspy
- Jad - Java decompiler
- JD-GUI -
Java decompiler
- CFR - Java
decompiler
- Krakatau -
Java decompiler
- FernFlower - Java
decompiler
- Redexer – apk
manipulation
- Simplify Android
deobfuscator
- Bytecode
viewer
- Radare2
- Jadx
- Dwarf - GUI for
reverse engineering
- Andromeda -
Another basic command-line reverse engineering tool
- apk-mitm - A
CLI application that prepares Android APK files for HTTPS
inspection
- Noia - Simple Android
application sandbox file browser tool
- Obfuscapk
- Obfuscapk is a modular Python tool for obfuscating Android apps
without needing their source code.
- ARMANDroid
- ARMAND (Anti-Repackaging through Multi-patternAnti-tampering based on
Native Detection) is a novel anti-tampering protection scheme that
embeds logic bombs and AT detection nodes directly in the apk file
without needing their source code.
- MVT (Mobile
Verification Toolkit) - a collection of utilities to simplify and
automate the process of gathering forensic traces helpful to identify a
potential compromise of Android and iOS devices
- Dexmod - tool to
exemplify patching Dalvik bytecode in a DEX (Dalvik Executable) file,
and assist in the static analysis of Android applications.
Procyon
- Java decompiler
Smali
viewer
ZjDroid,
fork/mirror
Dare –
.dex to .class converter
Fuzz Testing
- Radamsa
Fuzzer
- Honggfuzz
- An Android port
of the Melkor ELF fuzzer
- Media Fuzzing Framework
for Android
- AndroFuzz
- QuarksLab’s
Android Fuzzing
IntentFuzzer
App Repackaging Detectors
- FSquaDRA - a tool
for the detection of repackaged Android applications based on app
resources hash comparison.
Market Crawlers
- Google Play
crawler (Java)
- Google Play
crawler (Python)
- Google Play
crawler (Node) - get app details and download apps from the official
Google Play Store.
- Aptoide
downloader (Node) - download apps from Aptoide third-party Android
market
- Appland
downloader (Node) - download apps from Appland third-party Android
market
- PlaystoreDownloader
- PlaystoreDownloader is a tool for downloading Android applications
directly from the Google Play Store. After an initial (one-time)
configuration, applications can be downloaded by specifying their
package name.
- APK Downloader
Online Service to download APK from Playstore for specific Android
Device Configuration
Apkpure - Online apk
downloader. Provides also its own app for downloading.
- smalihook
- AXMLPrinter2
- to convert binary XML files to human-readable XML files
- adb
autocomplete
- mitmproxy
- dockerfile/androguard
- Android
Vulnerability Test Suite - android-vts scans a device for set of
vulnerabilities
- AppMon- AppMon is
an automated framework for monitoring and tampering with system API
calls of native macOS, iOS, and Android apps. It is based on Frida.
- Internal
Blue - Bluetooth experimentation framework based on Reverse
Engineering of Broadcom Bluetooth Controllers
- Android Mobile Device
Hardening - AMDH scans and hardens the device’s settings and lists
harmful installed Apps based on permissions.
Android
Device Security Database - Database of security features of Android
devices
Opcodes table
for quick reference
APK-Downloader
- seems dead now
Dalvik
opcodes
Vulnerable Applications
for practice
- Damn Insecure
Vulnerable Application (DIVA)
- Vuldroid
- ExploitMe
Android Labs
- GoatDroid
- Android
InsecureBank
- Insecureshop
- Oversecured Vulnerable
Android App (OVAA)
Academic/Research/Publications/Books
Research Papers
- Exploit
Database
- Android
security-related presentations
- A
good collection of static analysis papers
Books
- SEI
CERT Android Secure Coding Standard
Others
- OWASP Mobile Security
Testing Guide Manual
- doridori/Android-Security-Reference
- android
app security checklist
- Mobile
App Pentest Cheat Sheet
- Android
Reverse Engineering 101 by Daniele Altomare (Web Archive link)
Mobile Security
Reading Room - A reading room that contains well-categorized
technical reading material about mobile penetration testing, mobile
malware, mobile forensics, and all kind of mobile security-related
topics
Exploits/Vulnerabilities/Bugs
List
- Android
Security Bulletins
- Android’s
reported security vulnerabilities
- AOSP
- Issue tracker
- OWASP
Mobile Top 10 2016
- Exploit
Database - click search
- Vulnerability
Google Doc
- Google
Android Security Team’s Classifications for Potentially Harmful
Applications (Malware)
Android
Devices Security Patch Status
Malware
- androguard
- Database Android Malware wiki
- Android Malware
Github repo
- Android
Malware Genome Project - contains 1260 malware samples categorized
into 49 different malware families, free for research purposes.
- Contagio Mobile
Malware Mini Dump
- Drebin
- Kharon Malware
Dataset - 7 malware which have been reverse-engineered and
documented
- Android
Adware and General Malware Dataset
- AndroZoo - AndroZoo is a
growing collection of Android Applications collected from several
sources, including the official Google Play app market.
Android
PRAGuard Dataset - The dataset contains 10479 samples, obtained by
obfuscating the MalGenome and the Contagio Minidump datasets with seven
different obfuscation techniques.
Admire
Bounty Programs
- Android
Security Reward Program
How to report Security
issues
- Android
- reporting security issues
- Android
Reports and Resources - List of Android Hackerone disclosed reports
and other resources
Contributing
Your contributions are always welcome!