SUPERAndroidAnalyzer / Super

Licence: gpl-3.0
Secure, Unified, Powerful and Extensible Rust Android Analyzer

Programming Languages

rust
11053 projects

Projects that are alternatives of or similar to Super

Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+2501.18%)
Mutual labels:  security-tools, security-audit, vulnerabilities, security-scanner, security-automation
Ossa
Open-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+134.12%)
Mutual labels:  security-tools, security-audit, vulnerabilities, security-scanner
Patrowlmanager
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+6.76%)
Mutual labels:  security-tools, vulnerabilities, security-scanner, security-automation
Taipan
Web application vulnerability scanner
Stars: ✭ 359 (+5.59%)
Mutual labels:  security-tools, security-audit, security-scanner, security-automation
Wsltools
Web Scan Lazy Tools - Python Package
Stars: ✭ 288 (-15.29%)
Mutual labels:  security-tools, security-audit, security-scanner, security-automation
Purify
All-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-78.82%)
Mutual labels:  security-tools, security-audit, security-automation
Patrowldocs
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (-69.12%)
Mutual labels:  security-tools, security-scanner, security-automation
Salt Scanner
Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
Stars: ✭ 261 (-23.24%)
Mutual labels:  security-tools, security-audit, security-scanner
Patrowlengines
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (-52.35%)
Mutual labels:  security-tools, security-scanner, security-automation
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+436.47%)
Mutual labels:  security-tools, security-audit, security-scanner
Shodansploit
🔎 shodansploit > v1.3.0
Stars: ✭ 342 (+0.59%)
Mutual labels:  security-tools, security-scanner, security-automation
Insider
Static Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on a agile and easy to implement software inside your DevOps pipeline. Support the following technologies: Java (Maven and Android), Kotlin (Android), Swift (iOS), .NET Full Framework, C#, and Javascript (Node.js).
Stars: ✭ 216 (-36.47%)
Mutual labels:  security-tools, security-scanner, security-automation
Lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+2587.35%)
Mutual labels:  security-tools, security-audit, security-scanner
Nosqli
NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.
Stars: ✭ 120 (-64.71%)
Mutual labels:  security-tools, security-scanner, security-automation
Golang Tls
Simple Golang HTTPS/TLS Examples
Stars: ✭ 857 (+152.06%)
Mutual labels:  security-tools, security-audit, security-scanner
Nebulousad
NebulousAD automated credential auditing tool.
Stars: ✭ 158 (-53.53%)
Mutual labels:  security-tools, security-audit, security-automation
Vulny Code Static Analysis
Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex
Stars: ✭ 207 (-39.12%)
Mutual labels:  security-tools, vulnerabilities, security-scanner
Cobra
Source Code Security Audit (源代码安全审计)
Stars: ✭ 2,802 (+724.12%)
Mutual labels:  security-tools, security-audit, security-scanner
Brakeman
A static analysis security vulnerability scanner for Ruby on Rails applications
Stars: ✭ 6,281 (+1747.35%)
Mutual labels:  security-tools, security-audit, vulnerabilities
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+127.94%)
Mutual labels:  security-tools, vulnerabilities, security-scanner

SUPER Android Analyzer

Build Status codecov

SUPER Android Analyzer logo

Secure, Unified, Powerful and Extensible Rust Android Analyzer

SUPER is a command-line application that can be used in Windows, MacOS X and Linux, that analyzes .apk files in search for vulnerabilities. It does this by decompressing APKs and applying a series of rules to detect those vulnerabilities.

But, why create a new analyzer? Is it not enough with MobSF, Qark, Androbugs…? Well, we think it's not enough. All of them have two main issues we wanted to fix: They are written in Java or Python and they are not easily extensible. They are not meant to be used by businesses directly working in Android analysis, and don't put that kind of functionality first.

Our approach solves those issues in different ways: We first decided to use Rust as our programming language. The language developed openly by Mozilla Foundation gives us lots of utilities to work with regular expressions, files etc. and, most importantly, it enables us to create a secure software that does not depend in JVM or JIT compilers. With Rust, stack overflows, segmentation faults etc. are directly not possible, which makes sense in a security centered application. And it also gives us enough power to do efficient analysis, giving us the option to automate it in high volume. This is given by Rust zero-cost abstractions, that gives us an efficiency only comparable to C/C++.

And secondly, we decided to make the software 100% extensible: All rules are centered in a rules.json file, and each company or tester could create its own rules to analyze what they need. It's also modular, so that new developments can easily add new functionality. Finally, a templating system for results reports gives users the ability to personalize the report.

It also gives great code review tools, directly in the HTML report, so that anyone can search through the generated code with syntax highlighting for even better vulnerability analysis.

Installation

We have released some binaries in the download page for Windows (8.1+), Linux, and MacOS X. We only have 64-bit packages for now. If you need to use SUPER in a 32-bit system, you will need to compile SUPER from source. For that, you will need to install Rust with rustup.rs.

Note: It requires Java 1.7+ to run.

Usage

SUPER is very easy to use. Just download the desired .apk into the downloads folder (create that folder if necessary) and use the name as an argument when running the program. After the execution, a detailed report will appear in the results folder with that application name. There are a few usage options available:

USAGE:
    super [FLAGS] [OPTIONS] <package>

FLAGS:
        --bench       Show benchmarks for the analysis
        --force       If you'd like to force the auditor to do everything from the beginning
    -h, --help        Prints help information
        --html        Generates the reults in HTML format
        --json        Generates the reults in JSON format
        --open        Open the report in a browser once it is complete
    -q, --quiet       If you'd like a zen auditor that won't output anything in stdout
    -a, --test-all    Test all .apk files in the downloads directory
    -V, --version     Prints version information
    -v, --verbose     If you'd like the auditor to talk more than necessary

OPTIONS:
        --dex2jar <dex2jar>                    Where to store the jar files
        --dist <dist>                          Folder where distribution files will be extracted
        --downloads <downloads>                Folder where the downloads are stored
        --jd-cmd <jd-cmd>                      Path to the jd-cmd file
        --min-criticality <min_criticality>    Set a minimum criticality to analyze (Critical, High, Medium, Low)
        --results <results>                    Folder where to store the results
        --rules <rules>                        Path to a JSON rules file
        --template <template>                  Path to a results template file
    -t, --threads <threads>                    Number of threads to use, by default it will use one thread per logical CPU core

ARGS:
    <package>    The package string of the application to test

Contributing

Everybody is welcome to contribute to SUPER. Please check out the SUPER Contribution Guidelines for instructions about how to proceed.

Development documentation

License

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].