[摘]Android逆向分析常用网站
androidterm:
Android Terminal Emulator
http://code.google.com/p/androidterm/
droidbox:
Android Application Sandbox
https://code.google.com/p/droidbox/
TaintDroid:
Realtime Privacy Monitoring on Smartphones
https://github.com/TaintDroid
http://appanalysis.org/index.html
apktool:
A tool for reverse engineering Android apk files
http://code.google.com/p/android-apktool/
smali:
An assembler/disassembler for Android's dex format
https://code.google.com/p/smali/
AndBug:
a debugger targeting the Android platform's Dalvik virtual machine intended for reverse engineers and developers
https://github.com/swdunlop/AndBug
apkinspector:
APKinspector is a powerful GUI tool for analysts to analyze the Android applications.
https://code.google.com/p/apkinspector/
androguard:
Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)
https://code.google.com/p/androguard/
jad:
Java Decompiler tool
http://www.varaneckas.com/jad/
dex2jar:
Tools to work with android .dex and java .class files
http://code.google.com/p/dex2jar/
ded:
Decompiling Android Applications
http://siis.cse.psu.edu/ded/
ARE:
Virtual Machine for Android Reverse Engineering
https://redmine.honeynet.org/projects/are
STOWAWAY:
A static analysis tool and permission map for identifying permission use in Android applications
http://www.android-permissions.org/
COMDROID:
A static analysis tool for identifying application communication-based vulnerabilities.
http://www.comdroid.org/
dex-decomplier:
Dex decompiler
https://code.google.com/p/dex-decomplier/
amatutor:
Android恶意代码分析教程
https://github.com/secmobi/amatutor
mobile sandbox:
Provide an Android application file (apk-file) and the Mobile-Sandbox-System will analyze the file for malicious behaviour.
http://mobilesandbox.org/
apkstatics:
a tool for APK static security check
https://code.google.com/p/apkstatics/
DexGuard:
DexGuard is specialized optimizer and obfuscator for Android
http://www.saikoa.com/dexguard
android-stuff:
This is a repository for random scripts and files using for Android reversing
https://github.com/jlarimer/android-stuff
Dexter:
Dexter is a static android application analysis tool
http://code.google.com/p/android-market-api/
JEB:
The Interactive Android Decompiler.
http://www.android-decompiler.com/
APK_OneClick:
decompile & disassemble APKs
http://forum.xda-developers.com/showthread.php?t=873466
APK IDE:
小米人APK改之理(Apk IDE)是一款可视化的用于修改安卓Apk程序文件的工具
http://bbs.pediy.com/showthread.php?t=168001
ApkToolkit
是一款可视化的用于修改安卓Apk程序文件的工具
http://bbs.pediy.com/showthread.php?t=169975
smali-cfgs:
Smali Flow Graphs
https://code.google.com/p/smali-cfgs/
droidwall:
Android Firewall
https://code.google.com/p/droidwall/
connectbot:
Secure shell (SSH) client for the Android platform
https://code.google.com/p/connectbot/
金山火眼:
在线APK文件扫描及行为分析
https://fireeye.ijinshan.com/
Android安全监测网:
在线监测Android病毒检测
http://www.apk32.com/index.php
Virustotal:
VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
https://www.virustotal.com/en/
SandDroid
An APK Analysis Sandbox
http://sanddroid.xjtu.edu.cn/
AndroTotal:
AndroTotal is a free service to scan suspicious APKs against multiple mobile antivirus apps.
http://beta.andrototal.org/
[摘]Android逆向分析常用网站的更多相关文章
- Android逆向分析(2) APK的打包与安装背后的故事
前言 上一次我们反编译了手Q,并遇到了Apktool反编译直接crash的问题,虽然笔者很想在这次解决这个问题,但在解决途中,发现该保护依赖于很多知识,所以本次先插入一下,正所谓知其然知其所以然,授之 ...
- Android逆向分析(2) APK的打包与安装
http://blog.zhaiyifan.cn/2016/02/13/android-reverse-2/ 2/18日增加对aidl和java编译的描述. 前言 上一次我们反编译了手Q,并遇到了Ap ...
- Android逆向分析工具表
逆向分析工具表 工具 描述 网址 androidterm Android Terminal Emulator http://code.google.com/p/androidterm/ droidbo ...
- android逆向分析之smali语法
一 .smali数据类型 1.Dalvik字节码 Davlik字节码中,寄存器都是32位的,能够支持任何类型,64位类型(Long/Double)用2个连续的寄存器表示: Dalvik字节码有两种类型 ...
- Android逆向工程师的黑科技
你们发现了吗?Android逆向.安全方面的工程师真的越来越"稀有"了. 以腾讯.美团.百度为代表的大厂们,在某招聘网站上居然薪酬高达30-60k. 现在移动端市场越来越火热,AP ...
- Ratel:一直站在Android逆向巅峰的平头哥
本文来源:带动行业内卷,渣总义不容辞 字越少事儿越大,请关注github(可以点击阅读原文): https://github.com/virjarRatel 平头哥(ratel)是一个Android逆 ...
- android逆向学习小结--CrackMe_1
断断续续的总算的把android开发和逆向的这两本书看完了,虽然没有java,和android开发的基础,但总体感觉起来还是比较能接收的,毕竟都是触类旁通的.当然要深入的话还需要对这门语言的细节特性和 ...
- 【转】Android逆向入门流程
原文:https://www.jianshu.com/p/71fb7ccc05ff 0.写在前面 本文是笔者自学笔记,以破解某目标apk的方式进行学习,中间辅以原理性知识,方便面试需求. 参考文章的原 ...
- Android逆向之旅---静态方式分析破解视频编辑应用「Vue」水印问题
一.故事背景 现在很多人都喜欢玩文艺,特别是我身边的UI们,拍照一分钟修图半小时.就是为了能够在朋友圈显得逼格高,不过的确是挺好看的,修图的软件太多了就不多说了,而且一般都没有水印啥的.相比较短视频有 ...
随机推荐
- CentOS防火墙iptables-config的相关配置参数详解
默认/etc/sysoncifg/iptables-config的配置内容: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 2 ...
- ADO.Net连接Mysql
首先下载一个mysql.data.dll拷贝到bin下面并引用一下 using MySql.Data.MySqlClient; class Program { static void Main(str ...
- Exception in thread "main" java.util.concurrent.ExecutionException: org.apache.kafka.common.errors.TimeoutException: Expiring 1 record(s) for topic_test_1219-2: 30010 ms has passed since batch creatio
代码如下 public static void producer1() throws ExecutionException, InterruptedException { Properties pro ...
- Codeforces Round #395 (Div. 2) C
题意 : 给出一颗树 每个点都有一个颜色 选一个点作为根节点 使它的子树各自纯色 我想到了缩点后check直径 当<=3的时候可能有解 12必定有解 3的时候需要check直径中点的组成点里是否 ...
- 阿里云服务器windows server2008r2+tomcat8.0+nginx1.12
弄了两天的nginx,从了解开始,可能是我理解能力太差了,惭愧惭愧!但是还好看了一些大神的文章总算有点眉目了,此篇用来当作自己的笔记,大家看不懂,勿喷,但是如果有问题,直接回复,我可以给你解答一下,前 ...
- ReverseInteger
public class ReverseInteger { public static int reverse(int x) { long ret = 0; //如果是个位数,直接返回. if(x/1 ...
- python之Django admin总结
一.Django内置admin a.配置路由 urlpatterns = [ url(r'^admin/', admin.site.urls), ] b.定制admin 在admin.py中 ...
- java数组类Arrays:比较,填充,排序
int i1[] = {1,2,3,4,5,6}; int i2[] = {6,5,4,3,2,1}; //排序 Arrays.sort(i2); System.out.println(i1.equa ...
- python中利用正则表达式匹配ip地址
现在有一道题目,要求利用python中re模块来匹配ip地址,我们应如何着手? 首先能想到的是ip地址是数字,正则表达式是如何匹配数字的呢? \d或[0-9] 对于这个问题,不要一下子上来就写匹配模式 ...
- wiretiger引擎支持行、列存储、LSM,mongodb用的哪个?
来自 http://source.wiredtiger.com/ WiredTiger is an high performance, scalable, production quality, No ...