One-click screenshots, video recordings, APK installations for Android phones and smartwatches connected to your Mac
https://github.com/mortenjust/androidtool-mac
Python ADB + Fastboot implementation
https://github.com/google/python-adb
A better shell for Android devices
https://github.com/facebook/fb-adb
restart adbd with root privileges
https://github.com/poliva/rootadb
https://github.com/kosborn/p2p-adb/
A pure Node.js client for the Android Debug Bridge. https://github.com/CyberAgent/adbkit
http://code.google.com/p/apk-view-tracer/
Apk-view-tracer is a trigger tool for Android Dynamic Analysis and it can be used in android anti-virus dynamic analysis.
Also it provides a group open-API for developer. It can trace Apk view without source code. So it also can be used in black-box testing of Android Development.
It is based on tracing apk view, and it implement two functions for Android development :
- It provides apk automated testing interface.
- It provides a event trigger tool for apk dynamic analysis.
http://romannurik-code.googlecode.com/git/misc/bash_completion/adb
https://github.com/swdunlop/AndBug
AndBug is a debugger targeting the Android platform's Dalvik virtual machine intended for reverse engineers and developers. It uses the same interfaces as Android's Eclipse debugging plugin, the Java Debug Wire Protocol (JDWP) and Dalvik Debug Monitor (DDM) to permit users to hook Dalvik methods, examine process state, and even perform changes.
https://github.com/wuntee/android_debug
http://code.google.com/p/rxwen-blog-stuff/source/browse/trunk/tools/agdb.py
An Android cross platform gdb wrapper.
http://gnutoolchains.com/android/
Make any application debuggable on a device.
https://github.com/iSECPartners/Android-OpenDebug
A dynamic information flow tracing system for Android
https://github.com/0-14N/NDroid
Web App and Database for DroidBox
https://github.com/bbokorney/db-wa
http://forum.xda-developers.com/showthread.php?t=1574401
https://github.com/crmulliner/ddi
https://github.com/crmulliner/adbi
http://software.intel.com/sites/default/files/article/256671/pindroid-tutorial-01.pdf
https://github.com/AndroidHooker/hooker
https://code.google.com/p/libandroidinjector/
dexposed enable 'god' mode for single android application.
https://github.com/alibaba/dexposed
Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators
https://github.com/strazzere/android-lkms
Android import hook library
https://github.com/HiddenRambler/aihl
An Xposed based module which is capable of hooking both Android system APIs and applications' methods.
https://github.com/MindMac/AndroidEagleEye
Xposed module for obtaining SQLCipher crypto keys
https://github.com/jakev/SqlCipherHook
An application to dynamically inject a shared object into a running process on ARM architectures.
https://github.com/evilsocket/arminject
A project contains all method hook approachs for android such as dalvik hook, art hook, elf hook and inline hook
https://github.com/boyliang/AllHookInOne
https://github.com/kelwin/apkil
http://code.google.com/p/droidbox/wiki/APIMonitor
https://github.com/boyliang/injection_by_ptrace
https://github.com/floe/ltrace
Hooker is an opensource project for dynamic analyses of Android applications. This project provides various tools and applications that can be use to automaticaly intercept and modify any API calls made by a targeted application.
https://github.com/AndroidHooker/hooker
This is an extension from DroidBox APIMonitor to instrument and monitor the entry and exit of specified methods.
https://github.com/ericjyc/apkil_apimonitor
http://code.google.com/p/droidbox/
DroidBox provides:
- an Android system image, which can log and output behaviours of applications running in it.
- APIMonitor, a tool which can automatically modify APK file and add log codes for sensitive APIS.
https://github.com/dbaeumges/taintdroid_runner
Andrubis executes Android apps in a sandbox and provides a detailed report on their behavior, including file access, network access, crypto operations, dynamic code loading and information leaks. In addition to the dynamic analysis in the sandbox, Andrubis also performs static analysis, yielding information on e.g. the app's activities, services, required external libraries and actually required permissions.
CobraDroid is a custom build of the Android operating system geared specifically for application security analysts and for individuals dealing with mobile malware.
https://github.com/jakev/CobraDroidBeta
Home: http://mobilesandbox.org/
Project: http://www1.informatik.uni-erlangen.de/node/36
Mobile-Sandbox.com is part of the MobWorm project and provides static and dynamic malware analysis for Android OS smartphones.
https://github.com/mspreitz/mobile-sandbox
https://github.com/floe/mobile-sandbox
http://pegasus.cs.utah.edu:9090
http://copperdroid.isg.rhul.ac.uk/copperdroid/
http://list.cs.northwestern.edu/mobile/
http://dod.cs.northwestern.edu/plg/
http://dunkelheit.com.br/amat/analysis/index_en.php
report: http://apkscan.nviso.be/reports/NVISO%20ApkScan%20-%20Android%20malware%20report%20-%202013.pdf
blog: http://blog.nviso.be/
Blackbox tool to help understand what an Android application is doing at runtime and assist in the identification of potential security issues.
https://github.com/iSECPartners/Introspy-Android
Introspy is a set of iOS and Android tools designed to help understand what an iOS or Android application is doing at runtime and assist in the identification of potential security issues.
https://github.com/iSECPartners/Introspy-Analyzer
Dynamic malware analysis for the Android platform
https://github.com/VT-Magnum-Research/antimalware
https://code.google.com/p/decaf-platform/wiki/DroidScope
http://devadvance.com/rootcloakplus/
http://devadvance.com/rootcloak/
https://github.com/devadvance/rootcloak
http://site.kbc-brick.org/app/devicefaker
Open source module for Xposed Framework that hides root from specific apps
https://github.com/devadvance/rootcloak
https://github.com/groupon/odo
Bypass SSL certificate pinning for most applications
https://github.com/iSECPartners/Android-SSL-TrustKiller
https://github.com/opersys/process-explorer-web
https://github.com/opersys/process-explorer-app
https://github.com/wuntee/androidAuditTools/blob/master/bin/fsdiff.rb
https://github.com/wuntee/otertool
LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android.
https://github.com/504ensicsLabs/LiME
http://code.google.com/p/volatility/wiki/AndroidMemoryForensics
https://code.google.com/p/dyno-droid/
Update Readonly Properties
https://github.com/trevd/android_external_updateprop
Run android with S2E
https://github.com/michaekang/android_s2e
Bypass signature and permission checks for IPCs.
https://github.com/iSECPartners/Android-KillPermAndSigChecks
This project compiles various *nix tools and makes Opkg packages suitable for installation on ARM devices running Android.