{"id":6171,"date":"2022-11-17T08:08:13","date_gmt":"2022-11-17T08:08:13","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/?p=6171"},"modified":"2023-03-27T08:32:59","modified_gmt":"2023-03-27T08:32:59","slug":"android-security-tools-and-resources","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/","title":{"rendered":"Android Security Tools and Resources"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle; color: #2f2f2f;\"><a href=\"https:\/\/sajinshivdas.com\/security\/android-security-tools-and-resources\/?preview_id=6171&amp;preview_nonce=57951e9429&amp;post_format=standard&amp;_thumbnail_id=-1&amp;preview=true#Tools\"><span lang=\"en-AE\" style=\"font-family: -apple-system; font-size: 12.0pt; background: white;\">Tools<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle; color: #2f2f2f;\"><a href=\"https:\/\/sajinshivdas.com\/security\/android-security-tools-and-resources\/?preview_id=6171&amp;preview_nonce=57951e9429&amp;post_format=standard&amp;_thumbnail_id=-1&amp;preview=true#Academic\/Research\/Publications\/Books\"><span lang=\"en-AE\" style=\"font-family: -apple-system; font-size: 12.0pt; background: white;\">Academic\/Research\/Publications\/Books<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle; color: #2f2f2f;\"><a href=\"https:\/\/sajinshivdas.com\/security\/android-security-tools-and-resources\/?preview_id=6171&amp;preview_nonce=57951e9429&amp;post_format=standard&amp;_thumbnail_id=-1&amp;preview=true#Exploits\/Vulnerabilities\/Bugs\"><span lang=\"en-AE\" style=\"font-family: -apple-system; font-size: 12.0pt; background: white;\">Exploits\/Vulnerabilities\/Bugs<\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<blockquote>\n<h2>Android Security Tools and Resources<\/h2>\n<\/blockquote>\n[\/vc_column_text][nectar_single_testimonial testimonial_style=&#8221;basic&#8221; quote=&#8221;Compilation of Android security-related tools and resources&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3><strong>Tools<\/strong><\/h3>\n[\/heading][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Online Analyzers Tools<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/andrototal.org\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AndroTotal<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.appknox.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Appknox<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; not free<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/undroid.av-comparatives.info\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AVC UnDroid<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.virustotal.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Virustotal<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; max 128MB<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/app-ray.co\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Fraunhofer App-ray<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; not free<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.nowsecure.com\/blog\/2016\/09\/19\/announcing-nowsecure-lab-automated\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">NowSecure Lab Automated<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Enterprise tool for mobile app security testing both Android and iOS mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes. Not free<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/appdetonator.run\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">App Detonator<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Detonate APK binary to provide source code level details including app author, signature, build and manifest information. 3 Analysis\/day free quota.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/malab.bitbaan.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">BitBaan<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/beta.pithus.org\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Pithus<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Open-Source APK analyzer. Still in Beta for the moment and limited to static analysis for the moment. Possible to hunt malwares with Yara rules. More<\/span><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><a href=\"https:\/\/beta.pithus.org\/about\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">here<\/span><\/a><span lang=\"en-AE\" style=\"font-weight: bold;\">.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/approver.talos-sec.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Approver<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Approver is a fully automated security analysis and risk assessment platform for Android and iOS apps. Not free.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/oversecured.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Oversecured<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Enterprise vulnerability scanner for Android and iOS apps, it offers app owners and developers the ability to secure each new version of a mobile app by integrating Oversecured into the development process. Not free.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/appsweep.guardsquare.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AppSweep by Guardsquare<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Free, fast Android application security testing for developers<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/amaaas.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AMAaaS<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Free Android Malware Analysis Service. A baremetal service features static and dynamic analysis for Android applications. A product of<\/span><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><a href=\"https:\/\/malwarepot.com\/index.php\/AMAaaS\"><span lang=\"en-AE\" style=\"font-weight: bold;\">MalwarePot<\/span><\/a><span lang=\"en-AE\" style=\"font-weight: bold;\">.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/appcritique.boozallen.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AppCritique<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Upload your Android APKs and receive comprehensive free security assessments<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/apkscan.nviso.be\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">NVISO ApkScan<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; sunsetting on Oct 31, 2019<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/www.mobilemalware.com.br\/analysis\/index_en.php\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Mobile Malware Sandbox<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/appscan.bluemix.net\/mobileAnalyzer\"><span lang=\"en-AE\" style=\"font-weight: bold;\">IBM Security AppScan Mobile Analyzer<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; not free<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.visualthreat.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Visual Threat<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; no longer an Android app analyzer<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/tracedroid.few.vu.nl\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Tracedroid<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/habo.qq.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">habo<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; 10\/day<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/copperdroid.isg.rhul.ac.uk\/copperdroid\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">CopperDroid<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/sanddroid.xjtu.edu.cn\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">SandDroid<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/www.android-permissions.org\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Stowaway<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/anubis.iseclab.org\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Anubis<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/www.mobile-app-insight.org\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Mobile app insight<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/mobile-sandbox.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Mobile-Sandbox<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/safe.ijiami.cn\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Ijiami<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/www.comdroid.org\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Comdroid<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/www.androidsandbox.net\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Sandbox<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/www.foresafe.com\/scan\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Foresafe<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/dexter.dexlabs.org\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Dexter<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/www.mobiseclab.org\/eacus.jsp\"><span lang=\"en-AE\" style=\"font-weight: bold;\">MobiSec Eacus<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/fireeye.ijinshan.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Fireeye<\/span><\/a><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; max 60MB 15\/day<\/span><\/li>\n<li><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Static Analysis Tools<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/maaaaz\/androwarn\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Androwarn<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; detect and warn the user about potential malicious behaviours developed by an Android application.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/sonyxperiadev\/ApkAnalyser\"><span lang=\"en-AE\" style=\"font-weight: bold;\">ApkAnalyser<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/honeynet\/apkinspector\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">APKInspector<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.cert.org\/secure-coding\/tools\/didfail.cfm\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Droid Intent Data Flow Analysis for Information Leakage<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/bitbucket.org\/srl\/droidlegacy\"><span lang=\"en-AE\" style=\"font-weight: bold;\">DroidLegacy<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/EugenioDelfa\/Smali-CFGs\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Smali CFG generator<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/blogs.uni-paderborn.de\/sse\/tools\/flowdroid\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">FlowDroid<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.pnfsoftware.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Decompiler<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 not free<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/pscout.csl.toronto.edu\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">PSCout<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; A tool that extracts the permission specification from the Android OS source code using static analysis<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/amandroid.sireum.org\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Amandroid<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/dorneanu\/smalisca\"><span lang=\"en-AE\" style=\"font-weight: bold;\">SmaliSCA<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Smali Static Code Analysis<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/douggard\/CFGScanDroid\"><span lang=\"en-AE\" style=\"font-weight: bold;\">CFGScanDroid<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Scans and compares CFG against CFG of malicious applications<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/maldroid\/maldrolyzer\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Madrolyzer<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; extracts actionable data like C&amp;C, phone number etc.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.cs.washington.edu\/sparta\"><span lang=\"en-AE\" style=\"font-weight: bold;\">SPARTA<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; verifies (proves) that an app satisfies an information-flow security policy; built on the<\/span><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><a href=\"https:\/\/types.cs.washington.edu\/checker-framework\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Checker Framework<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/JulianSchuette\/ConDroid\"><span lang=\"en-AE\" style=\"font-weight: bold;\">ConDroid<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Performs a combination of symbolic + concrete execution of the app<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/serval-snt-uni-lu\/DroidRA\"><span lang=\"en-AE\" style=\"font-weight: bold;\">DroidRA<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/ClaudiuGeorgiu\/RiskInDroid\"><span lang=\"en-AE\" style=\"font-weight: bold;\">RiskInDroid<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; A tool for calculating the risk of Android apps based on their permissions, with online demo available.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/SUPERAndroidAnalyzer\/super\"><span lang=\"en-AE\" style=\"font-weight: bold;\">SUPER<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Secure, Unified, Powerful and Extensible Rust Android Analyzer<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/google\/android-classyshark\"><span lang=\"en-AE\" style=\"font-weight: bold;\">ClassyShark<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Standalone binary inspection tool which can browse any Android executable and show important infos.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/vincentcox\/StaCoAn\"><span lang=\"en-AE\" style=\"font-weight: bold;\">StaCoAn<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications. This tool was created with a big focus on usability and graphical guidance in the user interface.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/flankerhqd\/JAADAS\"><span lang=\"en-AE\" style=\"font-weight: bold;\">JAADAS<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Joint intraprocedure and interprocedure program analysis tool to find vulnerabilities in Android apps, built on Soot and Scala<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/quark-engine\/quark-engine\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Quark-Engine<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; An Obfuscation-Neglect Android Malware Scoring System<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/b-mueller\/apkx\"><span lang=\"en-AE\" style=\"font-weight: bold;\">One Step Decompiler<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Android APK Decompilation for the Lazy<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/dwisiswant0\/apkleaks\"><span lang=\"en-AE\" style=\"font-weight: bold;\">APKLeaks<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Scanning APK file for URIs, endpoints &amp; secrets.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/mpast\/mobileAudit\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Mobile Audit<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Web application for performing Static Analysis and detecting malware in Android APKs.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/siis.cse.psu.edu\/tools.html\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Several tools from PSU<\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>App Vulnerability Scanners<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/linkedin\/qark\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">QARK<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; QARK by LinkedIn is for app developers to scan app for security issues<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/AndroBugs\/AndroBugs_Framework\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AndroBugs<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/google\/nogotofail\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Nogotofail<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/devknox.io\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Devknox<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; IDE plugin to build secure Android apps. Not maintained anymore.<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Dynamic Analysis Tools<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/www.mulliner.org\/blog\/blosxom.cgi\/security\/androiddbiv02.html\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android DBI frameowork<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/sh4hin\/Androl4b\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Androl4b<\/span><\/a><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/nccgroup\/house\"><span lang=\"en-AE\" style=\"font-weight: bold;\">House<\/span><\/a><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; House: A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/MobSF\/Mobile-Security-Framework-MobSF\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Mobile-Security-Framework MobSF<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android\/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/appsec-labs.com\/AppUse\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AppUse<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 custom build for pentesting<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/pjlantz\/droidbox\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Droidbox<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/mwrlabs\/drozer\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Drozer<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/forum.xda-developers.com\/xposed\/xposed-installer-versions-changelog-t2714053\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Xposed<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; equivalent of doing Stub based code injection but without any modifications to the binary<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/ac-pm\/Inspeckage\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Inspeckage<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Android Package Inspector &#8211; dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/AndroidHooker\/hooker\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Hooker<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Dynamic Java code instrumentation (requires the Substrate Framework)<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/ZSShen\/ProbeDroid\"><span lang=\"en-AE\" style=\"font-weight: bold;\">ProbeDroid<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Dynamic Java code instrumentation<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/androidtamer.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Tamer<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Virtual \/ Live Platform for Android Security Professionals<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/sycurelab\/DECAF\"><span lang=\"en-AE\" style=\"font-weight: bold;\">DECAF<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Dynamic Executable Code Analysis Framework based on QEMU (DroidScope is now an extension to DECAF)<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/idanr1986\/cuckoo-droid\"><span lang=\"en-AE\" style=\"font-weight: bold;\">CuckooDroid<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Android extension for Cuckoo sandbox<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/MobileForensicsResearch\/mem\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Mem<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Memory analysis of Android (root required)<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/www.ida.liu.se\/labs\/rtslab\/publications\/2011\/spsm11-burguera.pdf\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Crowdroid<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 unable to find the actual tool<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/nwhusted\/AuditdAndroid\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AuditdAndroid<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 android port of auditd, not under active development anymore<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/code.google.com\/p\/asef\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Security Evaluation Framework<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; not under active development anymore<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/xurubin\/aurasium\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Aurasium<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/strazzere\/android-lkms\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Linux Kernel modules<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/manifestsecurity.com\/appie\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Appie<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on USB stick or smartphone. This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/zyrikby\/StaDynA\"><span lang=\"en-AE\" style=\"font-weight: bold;\">StaDynA<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden\/updated behavior and extend static analysis results with this information.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/zhengmin1989\/DroidAnalytics\"><span lang=\"en-AE\" style=\"font-weight: bold;\">DroidAnalytics<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; incomplete<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/oguzhantopgul\/Vezir-Project\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Vezir Project<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/xtiankisutsa\/MARA_Framework\"><span lang=\"en-AE\" style=\"font-weight: bold;\">MARA<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Mobile Application Reverse engineering and Analysis Framework<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/appanalysis.org\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Taintdroid<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; requires AOSP compilation<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/artist.cispa.saarland\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">ARTist<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; a flexible open source instrumentation and hybrid analysis framework for Android apps and Android&#8217;s java middleware. It is based on the Android Runtime&#8217;s (ART) compiler and modifies code during on-device compilation.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/Areizen\/Android-Malware-Sandbox\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Malware Sandbox<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/alexMyG\/AndroPyTool\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AndroPyTool<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; a tool for extracting static and dynamic features from Android APKs. It combines different well-known Android apps analysis tools such as DroidBox, FlowDroid, Strace, AndroGuard or VirusTotal analysis.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/m0bilesecurity\/RMS-Runtime-Mobile-Security\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Runtime Mobile Security (RMS)<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/Dado1513\/PAPIMonitor\"><span lang=\"en-AE\" style=\"font-weight: bold;\">PAPIMonitor<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 PAPIMonitor (Python API Monitor for Android apps) is a python tool based on Frida for monitoring user-select APIs during the app execution.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/NotSoSecure\/android_application_analyzer\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android_application_analyzer<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; The tool is used to analyze the content of the android application in local storage.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/www.mobilemalware.com.br\/amat\/download.html\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Malware Analysis Toolkit<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; (linux distro) Earlier it use to be an<\/span><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><a href=\"http:\/\/dunkelheit.com.br\/amat\/analysis\/index_en.php\"><span lang=\"en-AE\" style=\"font-weight: bold;\">online analyzer<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/redmine.honeynet.org\/projects\/are\/wiki\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Reverse Engineering<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 ARE (android reverse engineering) not under active development anymore<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.nowsecure.com\/blog\/2014\/09\/09\/introducing-vialab-community-edition\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">ViaLab Community Edition<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/labs.mwrinfosecurity.com\/tools\/2012\/03\/16\/mercury\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Mercury<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/thecobraden.com\/projects\/cobradroid\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Cobradroid<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 custom image for malware analysis<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Reverse Engineering<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/JesusFreke\/smali\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Smali\/Baksmali<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 apk decompilation<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/strazzere\/Emacs-Smali\"><span lang=\"en-AE\" style=\"font-weight: bold;\">emacs syntax coloring for smali files<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/codetastrophe.com\/smali.vim\"><span lang=\"en-AE\" style=\"font-weight: bold;\">vim syntax coloring for smali files<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/swdunlop\/AndBug\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AndBug<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/androguard\/androguard\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Androguard<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 powerful, integrates well with other tools<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/ibotpeaches.github.io\/Apktool\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Apktool<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 really useful for compilation\/decompilation (uses smali)<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/appknox\/AFE\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Framework for Exploitation<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/iSECPartners\/Android-KillPermAndSigChecks\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Bypass signature and permission checks for IPCs<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/iSECPartners\/Android-OpenDebug\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android OpenDebug<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 make any application on device debuggable (using cydia substrate).<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/pxb1988\/dex2jar\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Dex2Jar<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; dex to jar converter<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/google\/enjarify\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Enjarify<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; dex to jar converter from Google<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/sourceforge.net\/projects\/dedexer\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Dedexer<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/sysdream\/fino\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Fino<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.frida.re\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Frida<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; inject javascript to explore applications and a<\/span><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><a href=\"https:\/\/github.com\/antojoseph\/diff-gui\"><span lang=\"en-AE\" style=\"font-weight: bold;\">GUI tool<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">for it<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/bitbucket.org\/aseemjakhar\/indroid\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Indroid<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 thread injection kit<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.nccgroup.com\/us\/our-research\/intent-sniffer\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">IntentSniffer<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/iSECPartners\/Introspy-Android\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Introspy<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/varaneckas.com\/jad\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Jad<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Java decompiler<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/java-decompiler\/jd-gui\"><span lang=\"en-AE\" style=\"font-weight: bold;\">JD-GUI<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Java decompiler<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/www.benf.org\/other\/cfr\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">CFR<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Java decompiler<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/Storyyeller\/Krakatau\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Krakatau<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Java decompiler<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/fesh0r\/fernflower\"><span lang=\"en-AE\" style=\"font-weight: bold;\">FernFlower<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Java decompiler<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/plum-umd\/redexer\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Redexer<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 apk manipulation<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/CalebFenton\/simplify\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Simplify Android deobfuscator<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/Konloch\/bytecode-viewer\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Bytecode viewer<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/radare\/radare2\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Radare2<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/skylot\/jadx\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Jadx<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/iGio90\/Dwarf\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Dwarf<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; GUI for reverse engineering<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/secrary\/Andromeda\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Andromeda<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Another basic command-line reverse engineering tool<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/shroudedcode\/apk-mitm\"><span lang=\"en-AE\" style=\"font-weight: bold;\">apk-mitm<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; A CLI application that prepares Android APK files for HTTPS inspection<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/0x742\/noia\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Noia<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Simple Android application sandbox file browser tool<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/ClaudiuGeorgiu\/Obfuscapk\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Obfuscapk<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/Mobile-IoT-Security-Lab\/ARMANDroid\"><span lang=\"en-AE\" style=\"font-weight: bold;\">ARMANDroid<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; ARMAND (Anti-Repackaging through Multi-patternAnti-tampering based on Native Detection) is a novel anti-tampering protection scheme that embeds logic bombs and AT detection nodes directly in the apk file without needing their source code.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/mvt-project\/mvt\"><span lang=\"en-AE\" style=\"font-weight: bold;\">MVT (Mobile Verification Toolkit)<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/bitbucket.org\/mstrobel\/procyon\/wiki\/Java%20Decompiler\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Procyon<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Java decompiler<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/blog.avlyun.com\/wp-content\/uploads\/2014\/04\/SmaliViewer.zip\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Smali viewer<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/BaiduSecurityLabs\/ZjDroid\"><span lang=\"en-AE\" style=\"font-weight: bold;\">ZjDroid<\/span><\/a><span lang=\"en-AE\" style=\"font-weight: bold;\">,<\/span><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><a href=\"https:\/\/github.com\/yangbean9\/ZjDroid\"><span lang=\"en-AE\" style=\"font-weight: bold;\">fork\/mirror<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/siis.cse.psu.edu\/dare\/index.html\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Dare<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">\u2013 .dex to .class converter<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.decompiler.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Decompiler.com<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Online APK and Java decompiler<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Fuzz Testing<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.nccgroup.trust\/us\/about-us\/resources\/intent-fuzzer\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">IntentFuzzer<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/anestisb\/radamsa-android\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Radamsa Fuzzer<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/google\/honggfuzz\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Honggfuzz<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/anestisb\/melkor-android\"><span lang=\"en-AE\" style=\"font-weight: bold;\">An Android port of the melkor ELF fuzzer<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/fuzzing\/MFFA\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Media Fuzzing Framework for Android<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/jonmetz\/AndroFuzz\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AndroFuzz<\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>App Repackaging Detectors<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/zyrikby\/FSquaDRA\"><span lang=\"en-AE\" style=\"font-weight: bold;\">FSquaDRA<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; a tool for detection of repackaged Android applications based on app resources hash comparison.<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Market Crawlers<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/Akdeniz\/google-play-crawler\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Google play crawler (Java)<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/egirault\/googleplay-api\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Google play crawler (Python)<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/dweinstein\/node-google-play\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Google play crawler (Node)<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; get app details and download apps from official Google Play Store.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/dweinstein\/node-aptoide\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Aptoide downloader (Node)<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; download apps from Aptoide third-party Android market<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/dweinstein\/node-appland\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Appland downloader (Node)<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; download apps from Appland third-party Android market<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/apkpure.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Apkpure<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Online apk downloader. Provides also an own app for downloading.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/ClaudiuGeorgiu\/PlaystoreDownloader\"><span lang=\"en-AE\" style=\"font-weight: bold;\">PlaystoreDownloader<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; PlaystoreDownloader is a tool for downloading Android applications directly from the Google Play Store. After an initial (one-time) configuration, applications can be downloaded by specifying their package name.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/apkcombo.com\/apk-downloader\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">APK Downloader<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">Online Sevrice to download APK from Playstore for specific Android Device Configuration<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Misc Tools<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/androidcracking.blogspot.com\/2011\/03\/original-smalihook-java-source.html\"><span lang=\"en-AE\" style=\"font-weight: bold;\">smalihook<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/code.google.com\/p\/android4me\/downloads\/detail?name=AXMLPrinter2.jar\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AXMLPrinter2<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; to convert binary XML files to human-readable XML files<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/mbrubeck\/android-completion\"><span lang=\"en-AE\" style=\"font-weight: bold;\">adb autocomplete<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/mitmproxy\/mitmproxy\"><span lang=\"en-AE\" style=\"font-weight: bold;\">mitmproxy<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/dweinstein\/dockerfile-androguard\"><span lang=\"en-AE\" style=\"font-weight: bold;\">dockerfile\/androguard<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/AndroidVTS\/android-vts\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Vulnerability Test Suite<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; android-vts scans a device for set of vulnerabilities<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/dpnishant\/appmon\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AppMon<\/span><\/a><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; AppMon is an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on Frida.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/seemoo-lab\/internalblue\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Internal Blue<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Bluetooth experimentation framework based on Reverse Engineering of Broadcom Bluetooth Controllers<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.android-device-security.org\/client\/datatable\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Device Security Database<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; Database of security features of Android devices<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/SecTheTech\/AMDH\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Mobile Device Hardening<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; AMDH scans and harden device&#8217;s settings and list harmful installed Apps based on permissions.<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/ww38.xchg.info\/corkami\/opcodes_tables.pdf\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Opcodes table for quick reference<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/codekiem.com\/2012\/02\/24\/apk-downloader\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">APK-Downloader<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; seems dead now<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/pallergabor.uw.hu\/androidblog\/dalvik_opcodes.html\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Dalvik opcodes<\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Vulnerable Applications for practice<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/payatu\/diva-android\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Damn Insecure Vulnerable Application (DIVA)<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/jaiswalakshansh\/Vuldroid\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Vuldroid<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/securitycompass.github.io\/AndroidLabs\/setup.html\"><span lang=\"en-AE\" style=\"font-weight: bold;\">ExploitMe Android Labs<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/jackMannino\/OWASP-GoatDroid-Project\"><span lang=\"en-AE\" style=\"font-weight: bold;\">GoatDroid<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/dineshshetty\/Android-InsecureBankv2\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android InsecureBank<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/optiv\/insecureshop\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Insecureshop<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/oversecured\/ovaa\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Oversecured Vulnerable Android App (OVAA)<\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Academic\/Research\/Publications\/Books&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3>Academic\/Research\/Publications\/Books<\/h3>\n[\/heading][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Research Papers<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.exploit-db.com\/papers\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Exploit Database<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/jacobsoo\/AndroidSlides\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android security related presentations<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/tthtlc.wordpress.com\/2011\/09\/01\/static-analysis-of-android-applications\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">A good collection of static analysis papers<\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Books<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.securecoding.cert.org\/confluence\/display\/android\/Android+Secure+Coding+Standard\"><span lang=\"en-AE\" style=\"font-weight: bold;\">SEI CERT Android Secure Coding Standard<\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Others<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/OWASP\/owasp-mstg\"><span lang=\"en-AE\" style=\"font-weight: bold;\">OWASP Mobile Security Testing Guide Manual<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/doridori\/Android-Security-Reference\"><span lang=\"en-AE\" style=\"font-weight: bold;\">doridori\/Android-Security-Reference<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/b-mueller\/android_app_security_checklist\"><span lang=\"en-AE\" style=\"font-weight: bold;\">android app security checklist<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/github.com\/tanprathan\/MobileApp-Pentest-Cheatsheet\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Mobile App Pentest Cheat Sheet<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"http:\/\/web.archive.org\/web\/20180721134044\/http:\/www.fasteque.com:80\/android-reverse-engineering-101-part-1\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Reverse Engineering 101 by Daniele Altomare (Web Archive link)<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/mobile-security.zeef.com\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Mobile Security Reading Room<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; A reading room which contains well categorised technical reading material about mobile penetration testing, mobile malware, mobile forensics and all kind of mobile security related topics<\/span><\/li>\n<\/ul>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Exploits\/Vulnerabilities\/Bugs&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3>Exploits\/Vulnerabilities\/Bugs<\/h3>\n[\/heading][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>List<\/h4>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/source.android.com\/security\/bulletin\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Security Bulletins<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-1224\/product_id-19997\/Google-Android.html\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android&#8217;s reported security vulnerabilities<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/kb.androidtamer.com\/Device_Security_Patch_tracker\/\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Android Devices Security Patch Status<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/code.google.com\/p\/android\/issues\/list?can=2&amp;q=priority=Critical&amp;sort=-opened\"><span lang=\"en-AE\" style=\"font-weight: bold;\">AOSP &#8211; Issue tracker<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.owasp.org\/index.php\/Mobile_Top_10_2016-Top_10\"><span lang=\"en-AE\" style=\"font-weight: bold;\">OWASP Mobile Top 10 2016<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/www.exploit-db.com\/search\/?action=search&amp;q=android\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Exploit Database<\/span><\/a><span lang=\"en-US\" style=\"font-weight: bold;\">\u00a0<\/span><span lang=\"en-AE\" style=\"font-weight: bold;\">&#8211; click search<\/span><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/docs.google.com\/spreadsheet\/pub?key=0Am5hHW4ATym7dGhFU1A4X2lqbUJtRm1QSWNRc3E0UlE&amp;single=true&amp;gid=0&amp;output=html\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Vulnerability Google Doc<\/span><\/a><\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><a href=\"https:\/\/source.android.com\/security\/reports\/Google_Android_Security_PHA_classifications.pdf\"><span lang=\"en-AE\" style=\"font-weight: bold;\">Google Android Security Team\u2019s Classifications for Potentially Harmful Applications (Malware)<\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla<\/p>\n","protected":false},"author":1,"featured_media":6181,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[39,38,1],"tags":[37,36],"class_list":{"0":"post-6171","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-android-security","8":"category-mobile-security","9":"category-utilities","10":"tag-android-security","11":"tag-mobile-security"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Android Security Tools and Resources - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Security Tools and Resources - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-17T08:08:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:32:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/hand-touching-mobile-with-applications.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"25 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"Android Security Tools and Resources\",\"datePublished\":\"2022-11-17T08:08:13+00:00\",\"dateModified\":\"2023-03-27T08:32:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/\"},\"wordCount\":5002,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/hand-touching-mobile-with-applications.jpg\",\"keywords\":[\"Android Security\",\"Mobile Security\"],\"articleSection\":[\"Android Security\",\"Mobile Security\",\"Utilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/\",\"name\":\"Android Security Tools and Resources - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/hand-touching-mobile-with-applications.jpg\",\"datePublished\":\"2022-11-17T08:08:13+00:00\",\"dateModified\":\"2023-03-27T08:32:59+00:00\",\"description\":\"Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/hand-touching-mobile-with-applications.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/hand-touching-mobile-with-applications.jpg\",\"width\":1500,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/android-security-tools-and-resources\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Security Tools and Resources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Android Security Tools and Resources - Sajin Shivdas | Cybersecurity","description":"Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/","og_locale":"en_US","og_type":"article","og_title":"Android Security Tools and Resources - Sajin Shivdas | Cybersecurity","og_description":"Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2022-11-17T08:08:13+00:00","article_modified_time":"2023-03-27T08:32:59+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/hand-touching-mobile-with-applications.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"25 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"Android Security Tools and Resources","datePublished":"2022-11-17T08:08:13+00:00","dateModified":"2023-03-27T08:32:59+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/"},"wordCount":5002,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/hand-touching-mobile-with-applications.jpg","keywords":["Android Security","Mobile Security"],"articleSection":["Android Security","Mobile Security","Utilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/","name":"Android Security Tools and Resources - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/hand-touching-mobile-with-applications.jpg","datePublished":"2022-11-17T08:08:13+00:00","dateModified":"2023-03-27T08:32:59+00:00","description":"Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/hand-touching-mobile-with-applications.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/hand-touching-mobile-with-applications.jpg","width":1500,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/android-security-tools-and-resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Android Security Tools and Resources"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6171"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6171\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6181"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}