Android Pin Bruteforce
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
Awesome Reverse Engineering
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
memory search and patch tool on debuggable apk without root & ndk
An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners.
Android library to reveal or obfuscate strings and assets at runtime
Oversecured Vulnerable Android App
Scanning APK file for URIs, endpoints & secrets.
"Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
An app showcase of some techniques to improve Android app security
Android apk/sdk Scan包括android apk/sdk 安全审计代码扫描以及国内政策扫描
[OUTDATED & UNSUPPORTED] Droid Watcher - Android Spy Application
Android Mobile Device Hardening
Rms Runtime Mobile Security
Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
Mobile Security Framework Mobsf
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
axplorer - Android Permission Mappings
PINkman is a library to help implementing an authentication by a PIN code in a secure manner. The library derives hash from the user's PIN using Argon2 function and stores it in an encrypted file. The file is encrypted with the AES-256 algorithm in the GCM mode and keys are stored in the AndroidKeystore.
android proxy setting tool
Radare2 and Frida better together.
[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.
A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
CWAC-Security: Helping You Help Your Users Defend Their Data
Verify your In-App Purchase receipts & protect your Apps from hacking, patching used by Piracy Apps like Lucky Patcher.
Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.
Django application that performs SAST and Malware Analysis for Android APKs
Android process memory dump tool without ndk.
a useful utility for android app security testing