The "Awesome Android Security" project is a curated collection of resources focused on enhancing the security of Android applications. Android is a mobile operating system designed primarily for touchscreen devices, and this list encompasses a variety of tools, libraries, best practices, and tutorials related to Android security. It includes categories such as vulnerability assessment tools, secure coding guidelines, penetration testing resources, and community discussions. This list is valuable for developers, security researchers, and anyone interested in improving the security posture of their Android applications. Users can explore these resources to better understand security threats and implement effective defenses in their projects.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
The "Awesome Hacking" project is a curated resource list designed for those interested in the field of hacking, which involves exploring and exploiting vulnerabilities in computer systems and networks. This list encompasses a wide range of categories, including penetration testing tools, ethical hacking tutorials, security research papers, and community forums. It serves as a valuable resource for beginners looking to learn the basics of cybersecurity, as well as experienced professionals seeking advanced techniques and tools. Whether you are aiming to enhance your skills or stay updated on the latest security trends, this collection offers a wealth of information to support your hacking journey.
The "Awesome Security" project is a curated collection of resources focused on enhancing security practices in the digital realm. This list encompasses a wide range of categories including security tools, libraries, frameworks, tutorials, and best practices for various platforms and technologies. It is designed to benefit security professionals, developers, and system administrators alike, providing valuable insights and tools to safeguard applications and data. Whether you are a beginner looking to understand security fundamentals or an experienced practitioner seeking advanced techniques, this project offers a wealth of information to help you improve your security posture and protect your digital assets.
The "Awesome Malware Analysis" project is a curated resource list designed to assist security professionals and researchers in the field of malware analysis. Malware analysis involves examining malicious software to understand its behavior, functionality, and impact. This list includes tools for static and dynamic analysis, reverse engineering resources, malware databases, and educational materials such as tutorials and courses. It is valuable for both beginners looking to learn the basics and experienced analysts seeking advanced techniques and tools. Users can find a wealth of resources to enhance their skills and improve their malware analysis capabilities.
The "Awesome Web Security" project is a curated collection of resources focused on the security of web applications and services. Web security encompasses practices and technologies designed to protect websites and online services from cyber threats, vulnerabilities, and attacks. This list includes tools for penetration testing, secure coding practices, frameworks, libraries, and educational materials such as articles and tutorials. It is valuable for developers, security professionals, and researchers who seek to enhance their understanding of web security and implement robust security measures. Users can find essential tools and knowledge to safeguard their web applications effectively and stay ahead of potential threats.
A standalone binary inspection tool for Android developers to browse executables and analyze bytecode.
An obfuscation-neglect Android malware scoring system that analyzes APKs for malicious behavior patterns.
A tool to scan APK files for URIs, endpoints, secrets, and sensitive data patterns.
A static code analysis tool for Kotlin that identifies code smells and enforces coding standards.
An automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis, and security assessment framework.
A security testing framework for Android that identifies vulnerabilities by interacting with apps, IPC endpoints, and the OS.
An Xposed module for dynamic analysis of Android apps via API hooks, unexported activity launching, and runtime inspection.
A web interface powered by FRIDA for runtime manipulation, analysis, and security testing of Android and iOS applications.
A Burp Suite extension that bridges to Frida, enabling dynamic analysis and manipulation of mobile app traffic using the app's own code.
A forensic software utility for read-only, non-destructive data acquisition and analysis from Android smartphones.
An assembler/disassembler for Android's dex format, enabling low-level manipulation of Dalvik bytecode.
A Python toolkit for reverse engineering, analyzing, and pentesting Android applications (APK, DEX, resources).
A set of tools for converting Android .dex files to Java .class files and working with Dalvik bytecode.
A tool for translating Dalvik bytecode to Java bytecode, enabling Java analysis tools to work with Android applications.
A standalone graphical utility that displays Java source code from compiled CLASS files.
A Java bytecode assembler, disassembler, and decompiler designed to handle obfuscated code and support the latest JVM specifications.
An analytical decompiler that converts Java bytecode back into readable Java source code, used in IntelliJ IDEA.
A generic Android deobfuscator that uses virtual execution to simplify obfuscated code for human analysis.
A lightweight Java/Android reverse engineering suite with decompilers, disassemblers, and advanced analysis tools.
A libre, Unix-like reverse engineering framework and command-line toolset for analyzing, debugging, and modifying binaries.
A command line and GUI tool for decompiling Android Dex and APK files into readable Java source code.
A CLI tool that automatically patches Android APK files to bypass HTTPS security for traffic inspection.
A forensic toolkit for gathering and analyzing traces on Android and iOS devices to identify potential spyware compromise.
A Python-based hacking tool for remotely exploiting Android devices via ADB and Metasploit to gain Meterpreter sessions.
A VS Code extension that integrates Android reverse-engineering tools for APK analysis, modification, and debugging.