AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the accumulation of most recent framework, instructional exercises and labs from various security nerds and researchers for figuring out and malware analysis.
Radare2 Unix-like reverse engineering framework and commandline tools
Frida Inject JavaScript to explore native apps on Windows, macOS, Linux, iOS, Android, and QNX.
ByteCodeViewer Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger)
Mobile Security Framework (MobSF) (Android/iOS) Automated Pentesting Framework (Just Static Analysis in this VM)
Drozer Security Assessment Framework for Android Applications
APKtool Reverse Engineering Android Apks
AndroidStudio IDE For Android Application Development
BurpSuite Assessing Application Security
Wireshark Network Protocol Analyzer
MARA Mobile Application Reverse engineering and Analysis Framework
FindBugs-IDEA Static byte code analysis to look for bugs in Java code
AndroBugs Framework Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications
Qark Tool to look for several security related Android application vulnerabilities
Damn Insecure and vulnerable App for Android(DIVA) Vulnerable Android Application
InsecureBankv2 Vulnerable Android Application
Android Security Sandbox An app showcase of some techniques to improve Android app security
GoatDroid A fully functional and self-contained training environment for educating developers and testers on Android security
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…