Dynamic Analysis Tools 2020 Topic


1. [Android DBI frameowork](http://www.mulliner.org/blog/blosxom.cgi/security/androiddbiv02.html)

2. [Androl4b](https://github.com/sh4hin/Androl4b)- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis

4. [Mobile-Security-Framework MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) - Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.

5. [AppUse](https://appsec-labs.com/AppUse/) – custom build for pentesting

6. [Droidbox](https://github.com/pjlantz/droidbox)

10. [Drozer](https://github.com/mwrlabs/drozer)

11. [Xposed](https://forum.xda-developers.com/xposed/xposed-installer-versions-changelog-t2714053) - equivalent of doing Stub based code injection but without any modifications to the binary

12. [Inspeckage](https://github.com/ac-pm/Inspeckage) - Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)

13. [Android Hooker](https://github.com/AndroidHooker/hooker) - Dynamic Java code instrumentation (requires the Substrate Framework)

14. [ProbeDroid](https://github.com/ZSShen/ProbeDroid) - Dynamic Java code instrumentation

15. [Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals

16. [DECAF](https://github.com/sycurelab/DECAF) - Dynamic Executable Code Analysis Framework based on QEMU (DroidScope is now an extension to DECAF)

17. [CuckooDroid](https://github.com/idanr1986/cuckoo-droid) - Android extension for Cuckoo sandbox

18. [Mem](https://github.com/MobileForensicsResearch/mem) - Memory analysis of Android (root required)

19. [Crowdroid](http://www.ida.liu.se/labs/rtslab/publications/2011/spsm11-burguera.pdf) – unable to find the actual tool

20. [AuditdAndroid](https://github.com/nwhusted/AuditdAndroid) – android port of auditd, not under active development anymore

21. [Android Security Evaluation Framework](https://code.google.com/p/asef/) - not under active development anymore

23. [Aurasium](https://github.com/xurubin/aurasium) – Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.

24. [Android Linux Kernel modules](https://github.com/strazzere/android-lkms)

25. [Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on USB stick or smartphone. This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.

26. [StaDynA](https://github.com/zyrikby/StaDynA) - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information.

27. [DroidAnalytics](https://github.com/zhengmin1989/DroidAnalytics) - incomplete

28. [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis

29. [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse engineering and Analysis Framework

30. [Taintdroid](http://appanalysis.org) - requires AOSP compilation




No comments:

Post a Comment

How to use objects in JavaScript framework.mp4

  In JavaScript frameworks (like React, Angular, or Vue), objects are commonly used to manage and structure data, represent state, pass prop...