Jump to content
Nytro

Android Malware Analysis Tools

Recommended Posts

Posted

Android Malware Analysis Tools

[TABLE=width: 900]

[TR]

[TD=class: news-txt, width: 900, align: left]

TOOLS

» AFLogical - Android forensics tool developed by viaForensics

» AndroChef - Java Decompiler apk, dex, jar and java class-files

» Androguard - Reverse engineering, Malware and goodware analysis of Android applications

» Android Loadable Kernel Modules

» Android SDK

» Android4me - J2ME port of Google's Android

» Android-apktool - A tool for reverse engineering Android apk files

» Android-forensics - Open source Android Forensics app and framework

» Android-random - Collection of extended examples for Android developers

» APK Studio - Android Reverse Engineering Tool By Vaibhav Pandey a.k.a VPZ

» ApkAnalyser - Static, virtual analysis tool

» Apk-extractor - Android Application (.apk) file extractor and Parser for Android Binary XML

» Apkinspector - Powerful GUI tool for analysts to analyze the Android applications

» Apk-recovery - Recover main resources from your .apk file

» ART - GUI for all your decompiling and recompiling needs

» Audit tools

» Canhazaxs - A tool for enumerating the access to entries in the file system of an Android device

» Dava - Decompiler for arbitrary Java bytecode

» DDMS - Dalvik Debug Monitor Server

» Decaf-platform - DECAF Binary Analysis Platform

» DecoJer - Java Decompiler

» Dedexer - Disassembler tool for DEX files.

» Device Monitor - Graphical user interface for several Android application debugging and analysis tools

» Dex2jar - Tools to work with android .dex and java .class files

» Dex-decomplier - Dex decompiler

» Dexinfo - A very rudimentary Android DEX file parser

» Dexter - Static android application analysis tool

» Dexterity - Dex manipulation library

» Dextools - Miscellaenous DEX (Dalvik Executable) tools

» Drozer - Comprehensive security audit and attack framework for Android

» Heimdall - Cross-platform open-source tool suite used to flash firmware (aka ROMs) onto Samsung mobile devices

» Hidex - Demo application where a method named thisishidden() in class MrHyde is hidden from disassemblers but no called by the app

» Hooker - Automated Dynamic Analysis of Android Applications

» JAD - Java Decompiler

» JADX - Dex to Java decompiler

» JD-GUI - Standalone graphical utility that displays Java source codes of “.class” files

» JEB Decompiler - The Interactive Android Decompiler

» Luyten - Java Decompiler Gui for Procyon

» Radare - The reverse engineering framework

» Redexer - A Dalvik bytecode instrumentation framework

» Reverse Android - Reverse-engineering tools for Android applications

» Scalpel - A surgical debugging tool to uncover the layers under your app

» Smali - An assembler/disassembler for Android's dex format

» Soot - Java Optimization Framework

» STAMP - STatic Analysis of Mobile Programs

» Systrace - Analyze the performance capturing and displaying execution times of your applications and other Android system processes

» TaintDroid - Tracking how apps use sensitive information required

» Traceview - Graphical viewer for execution logs saved by your application

» Undx - Bytecode translator

» Xenotix-APK-Decompiler - APK decompiler powered by dex2jar and JAD

» XML-apk-parser - Print AndroidManifest.xml directly from apk file

» ZjDroid - Android app dynamic reverse tool based on Xposed framework

UNPACKERS

» Android Unpacker - Android Unpacker presented at Defcon 22 - Android Hacker Protection Level 0

» Dehoser - Unpacker for the HoseDex2Jar APK Protection which packs the original file inside the dex header

» Kisskiss - Unpacker for various Android packers/protectors

PACKERS / OBFUSCATORS

» Allatori

» APKfuscator - A generic DEX file obfuscator and munger

» APKProtect

» Bangcle

» DexGuard - Optimizer and obfuscator for Android

» HoseDex2Jar - Adds some instructions to the classes.dex file that Dex2Jar can not process

» ProGuard - Shrinks, optimizes, and obfuscates the code by removing unused code and renaming classes, fields, and methods with semantically obscure names

TOOLKITS

» Android Malware Analysis Toolkit

» APK Resource Toolkit

» MobiSec

» Open Source Android Forensics Toolkit

» Santoku

SANDBOXES

» Android Sandbox

» Anubis

» APK Analyzer

» AVCaesar

» Droidbox

» HackApp

» Mobile Sandbox

» SandDroid

» VisualThreat

[/TD]

[/TR]

[/TABLE]

Sursa: http://www.nyxbone.com/malware/android_tools.html

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...