Droidefense is the codename for android apps/malware analysis/reversing tool. It was built focused on security issues and tricks that malware researcher have on they every day work.
For those situations on where the malware has anti-analysis routines, Droidefense attemps to bypass them in order to get to the code and ‘bad boy’ routine.
Sometimes those techniques can be virtual machine detection, emulator detection, self certificate checking, pipes detection. tracer pid check, and so on.
Droidefense uses an innovative idea in where the code is not decompiled rather than viewed.
This allow us to get the global view of the execution workflow of the code with a 100% accuracy on gathered information. With this situation, Droidefensegenerates a fancy html report with the results for an easy understanding.
Also Read – H2T : HTTP Hardening Tool Scans Website & Suggests Security Headers to Apply
Droidefense Features
java -jar droidefense-cli-1.0-SNAPSHOT.jar -i /path/to/your/sample.apk
Detailed usage
java -jar droidefense-cli-1.0-SNAPSHOT.jar
Current build: 2018_03_09__09_17_34
Check out on Github: https://github.com/droidefense/
Report your issue: https://github.com/droidefense/engine/issues
Lead developer: @zerjioang
usage: droidefense
-d,–debug print debugging information
-h,–help print this message
-i,–input input .apk to be analyzed
-o,–output select prefered output:
json
json.min
html
-p,–profile Wait for JVM profiler
-s,–show show generated report after scan
-u,–unpacker select prefered unpacker:
zip
memapktool
-v,–verbose be verbose
-V,–version show current version information
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…