Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 15 additions & 11 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ <h1><span class="fa fa-mobile" title="Mobile Security Wiki" style="cursor:pointe
<section>
<p><span style="cursor:pointer;" title="Android" class="fa fa-android fa-3x" onclick="display_section('android')"></span>&nbsp;&nbsp;&nbsp;&nbsp;<span style="cursor:pointer;" title="iOS" class="fa fa-apple fa-3x" onclick="display_section('ios')"></span>&nbsp;&nbsp;&nbsp;&nbsp;<span style="cursor:pointer;" title="Windows App" class="fa fa-windows fa-3x" onclick="display_section('windows')"></span></p>
<p>Please click on above icons to navigate between Wikis.</p>
<p>Please use left sidebar to navigate between sections.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Last Updated on: <strong>12-8-2016</strong></p>
<p>Please use left sidebar to navigate between sections.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Last Updated on: <strong>2017-07-18</strong></p>
<a id="forensics-tools" class="anchor" href="#forensics-tools" aria-hidden="true" style="display:block"></a>
<h2><i class="fa fa-folder"></i> Forensics Tools <a href="#forensics-tools"><span class="octicon octicon-link"></span></a></h2>
<ul>
Expand Down Expand Up @@ -198,7 +198,7 @@ <h2><i class="fa fa-backward"></i> Reverse Engineering Tools <a href="#reverse-e
<li>
<p><a href="https://github.com/androguard/androguard" target="_blank">Androguard</a> - Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)</p>
</li>
<li>
<li>
<p><a href="http://www.javadecompilers.com/apk" target="_blank">Android Apk decompiler</a> - Online decompile for Apk and Dex Android files</p>
</li>
<li>
Expand All @@ -216,8 +216,12 @@ <h2><i class="fa fa-backward"></i> Reverse Engineering Tools <a href="#reverse-e
<li>
<p><a href="https://github.com/Konloch/bytecode-viewer" target="_blank">Bytecode-Viewer</a> - A Java 8 Jar &amp; Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger &amp; More)</p>
</li>
<li><p><a href="http://www.api-solutions.com/p/classyshark.html" target="_blank">ClassyShark</a> - Android executables browser for analyzing APKs.</p></li>
<li><p><a href="http://sseblog.ec-spride.de/2014/12/codeinspect/" target="_blank">CodeInspect</a> - A Jimple-based Reverse-Engineering framework for Android and Java applications.</p></li>
<li>
<p><a href="https://github.com/google/android-classyshark" target="_blank">ClassyShark</a> - Android executables browser for analyzing APKs.</p>
</li>
<li>
<p><a href="http://sseblog.ec-spride.de/2014/12/codeinspect/" target="_blank">CodeInspect</a> - A Jimple-based Reverse-Engineering framework for Android and Java applications.</p>
</li>
<li>
<p><a href="https://github.com/mariokmk/dedex" target="_blank">dedex</a> - A command line tool for disassembling Android DEX files.</p>
</li>
Expand Down Expand Up @@ -249,7 +253,7 @@ <h2><i class="fa fa-backward"></i> Reverse Engineering Tools <a href="#reverse-e
<p><a href="https://www.pnfsoftware.com/index" target="_blank">JEB</a> - The Interactive Android Decompiler</p>
</li>
<li>
<p><a href="https://github.com/LifeForm-Labs/lobotomy" target="_blank">Lobotomy</a> - Lobotomy is an Android security toolkit that will automate different Android assessments and reverse engineering tasks. The goal of the Lobotomy toolkit is to provide a console environment, which would allow a user to load their target Android APK once, then have all the necessary tools without needing to exit that environment. The 1.2 release will remain open source.</p>
<p><a href="https://github.com/AndroidSecurityTools/lobotomy" target="_blank">Lobotomy</a> - Lobotomy is an Android security toolkit that will automate different Android assessments and reverse engineering tasks. The goal of the Lobotomy toolkit is to provide a console environment, which would allow a user to load their target Android APK once, then have all the necessary tools without needing to exit that environment. The 1.2 release will remain open source.</p>
</li>
<li>
<p><a href="https://code.google.com/p/smali/" target="_blank">smali</a> - An assembler/disassembler for Android's dex format</p>
Expand All @@ -260,7 +264,7 @@ <h2><i class="fa fa-backward"></i> Reverse Engineering Tools <a href="#reverse-e
<li>
<p><a href="https://github.com/cx9527/strongdb" target="_blank">Strongdb</a> - Strongdb is a gdb plugin that is written in Python, to help with debugging Android Native program.The main code uses gdb Python API.</p>
</li>
<li>
<li>
<p><a href="https://github.com/ajinabraham/Xenotix-APK-Reverser" target="_blank">Xenotix APK Reverser</a> - An open source Android Application Package (APK) decompiler and disassembler powered by dex2jar, baksmali and jd-core</p>
</li>
</ul>
Expand Down Expand Up @@ -312,7 +316,7 @@ <h2><i class="fa fa-unlock-alt"></i> Obfuscators & Deobfuscators Tools <a href="
<h2><i class="fa fa-globe"></i> Online Analyzers <a href="#online-analyzers"><span class="octicon octicon-link"></span></a></h2>
<ul>
<li>
<p><a href="https://androidobservatory.org/" target="_blank">Android Observatory</a> - The Android Observatory is a web interface to a large repository of Android applications. It allows users to search or browse through thousands of Android apps and retrieve metadata for those apps. </p>
<p><del><a href="https://androidobservatory.org/" target="_blank">Android Observatory</a> - The Android Observatory is a web interface to a large repository of Android applications. It allows users to search or browse through thousands of Android apps and retrieve metadata for those apps.</del></p>
</li>
<li>
<p><a href="http://www.decompileandroid.com/" target="_blank">Android APK Decompiler</a> - Decompiling APK files made easy. Online decompiler.</p>
Expand All @@ -321,13 +325,13 @@ <h2><i class="fa fa-globe"></i> Online Analyzers <a href="#online-analyzers"><sp
<p><a href="http://andrototal.org/" target="_blank">AndroidTotal</a> - AndroTotal is a free service to scan suspicious APKs against multiple mobile antivirus apps.</p>
</li>
<li>
<p><a href="http://anubis.iseclab.org/" target="_blank">Anubis</a> - Malware Analysis for Unknown Binaries.</p>
<p><del><a href="http://anubis.iseclab.org/" target="_blank">Anubis</a> - Malware Analysis for Unknown Binaries.</del></p>
</li>
<li>
<p><a href="http://www.mobiseclab.org/akana/Intro.html" target="_blank">Akana</a> - Akana is an online Android app Interactive Analysis Enviroment (IAE), which is combined with some plugins for checking the malicious app.</p>
<p><del><a href="http://www.mobiseclab.org/akana/Intro.html" target="_blank">Akana</a> - Akana is an online Android app Interactive Analysis Enviroment (IAE), which is combined with some plugins for checking the malicious app.</del></p>
</li>
<li>
<p><a href="http://www.app360scan.com/" target="_blank">App360Scan</a> - Tells about permissons used by an Application and what harm it can cause to users.</p>
<p><del><a href="http://www.app360scan.com/" target="_blank">App360Scan</a> - Tells about permissons used by an Application and what harm it can cause to users.<del></p>
</li>
<li>
<p><a href="http://copperdroid.isg.rhul.ac.uk/copperdroid/" target="_blank">CopperDroid</a> - It automatically perform out-of-the-box dynamic behavioral analysis of Android malware.</p>
Expand All @@ -336,7 +340,7 @@ <h2><i class="fa fa-globe"></i> Online Analyzers <a href="#online-analyzers"><sp
<p><a href="https://dexter.dexlabs.org/" target="_blank">Dexter</a> - Dexter is an interactive Android software analysis environment with collaboration features.</p>
</li>
<li>
<p><a href="http://www.mobiseclab.org/eacus.jsp" target="_blank">Eacus</a> - A lite Android app analysis framework</p>
<p><del><a href="http://www.mobiseclab.org/eacus.jsp" target="_blank">Eacus</a> - A lite Android app analysis framework<del></p>
</li>
<li>
<p><a href="http://mobilesandbox.org/" target="_blank">Mobile Sandbox</a> - The Mobile-Sandbox provides static and dynamic malware analysis combined with machine learning techniques for Android applications. </p>
Expand Down