All Projects → sh4hin → Androl4b

sh4hin / Androl4b

A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis

Projects that are alternatives of or similar to Androl4b

Jackhammer
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (-30.29%)
Mutual labels:  penetration-testing, application-security, mobile-security
Awesome Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+5190.53%)
Mutual labels:  penetration-testing, reverse-engineering
Mssqli Duet
SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing
Stars: ✭ 82 (-90.97%)
Mutual labels:  penetration-testing, application-security
Wstg
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Stars: ✭ 3,873 (+326.54%)
Mutual labels:  penetration-testing, application-security
Vscode Frida
Unofficial frida extension for VSCode
Stars: ✭ 221 (-75.66%)
Mutual labels:  mobile-security, reverse-engineering
Vyapi
VyAPI - A cloud based vulnerable hybrid Android App
Stars: ✭ 75 (-91.74%)
Mutual labels:  application-security, mobile-security
Tcpproxy
Intercepting TCP proxy to modify raw TCP streams using modules on incoming or outgoing traffic
Stars: ✭ 176 (-80.62%)
Mutual labels:  penetration-testing, reverse-engineering
Rms Runtime Mobile Security
Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
Stars: ✭ 1,194 (+31.5%)
Mutual labels:  mobile-security, reverse-engineering
remote-adb-scan
pure python remote adb scanner + nmap scan module
Stars: ✭ 19 (-97.91%)
Mutual labels:  penetration-testing, mobile-security
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+285.79%)
Mutual labels:  penetration-testing, application-security
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+358.37%)
Mutual labels:  penetration-testing, reverse-engineering
Apkleaks
Scanning APK file for URIs, endpoints & secrets.
Stars: ✭ 2,707 (+198.13%)
Mutual labels:  mobile-security, reverse-engineering
Iosreextension
A fast and elegant extension for VSCode used for iOSre projects.
Stars: ✭ 139 (-84.69%)
Mutual labels:  mobile-security, reverse-engineering
Evabs
An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners.
Stars: ✭ 173 (-80.95%)
Mutual labels:  application-security, mobile-security
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+102.31%)
Mutual labels:  mobile-security, reverse-engineering
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+1162.78%)
Mutual labels:  penetration-testing, reverse-engineering
Frida Snippets
Hand-crafted Frida examples
Stars: ✭ 1,081 (+19.05%)
Mutual labels:  mobile-security, reverse-engineering
Appmon
Documentation:
Stars: ✭ 1,157 (+27.42%)
Mutual labels:  mobile-security, reverse-engineering
Command Mobile Penetration Testing Cheatsheet
Mobile penetration testing android & iOS command cheatsheet
Stars: ✭ 221 (-75.66%)
Mutual labels:  penetration-testing, mobile-security
Dexcalibur
[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Stars: ✭ 512 (-43.61%)
Mutual labels:  mobile-security, reverse-engineering

Androl4b

AndroL4b is an android security virtual machine based on ubuntu-mate includes the collection of latest framework, tutorials and labs from different security geeks and researchers for reverse engineering and malware analysis.

What's new in Androl4b v.3?

  • Tools are updated
  • New tools and lab added
  • Upgraded to Ubuntu mate 17.04
  • Some cleanup

Mega Part 1

Mega Part 2

Google Drive Part 1

Google Drive Part 2

Follow me alt text

Username : andro

Password : andro

Emulator Pin: 1234

Tools

Radare2 Unix-like reverse engineering framework and commandline tools

Frida Inject JavaScript to explore native apps on Windows, macOS, Linux, iOS, Android, and QNX.

ByteCodeViewer Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger)

Mobile Security Framework (MobSF) (Android/iOS) Automated Pentesting Framework (Just Static Analysis in this VM)

Drozer Security Assessment Framework for Android Applications

APKtool Reverse Engineering Android Apks

AndroidStudio IDE For Android Application Development

BurpSuite Assessing Application Security

Wireshark Network Protocol Analyzer

MARA Mobile Application Reverse engineering and Analysis Framework

FindBugs-IDEA Static byte code analysis to look for bugs in Java code

AndroBugs Framework Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications

Qark Tool to look for several security related Android application vulnerabilities

Labs:

Damn Insecure and vulnerable App for Android(DIVA) Vulnerable Android Application

InsecureBankv2 Vulnerable Android Application

Android Security Sandbox An app showcase of some techniques to improve Android app security

GoatDroid A fully functional and self-contained training environment for educating developers and testers on Android security

Sieve: A Password Manager App, showcasing some common Android vulnerabilities

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].