ConDroid
Android analyzer
A tool that performs symbolic and concrete execution of Android apps to analyze behavior at specific code locations
Symbolic/concolic execution of Android apps
56 stars
6 watching
13 forks
Language: Java
last commit: almost 9 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A tool for analyzing and reverse engineering Android applications using dynamic instrumentation automation and Frida. | 1,063 |
| A tool for analyzing Android applications to extract static and dynamic features | 356 |
| Analyzes Android app behavior to detect security vulnerabilities and malicious activities | 761 |
| An Android-specific toolkit for analyzing and understanding APK files | 118 |
| A tool for analyzing and reverse-engineering Android applications | 702 |
| A tool for analyzing bare-metal Android devices | 91 |
| A toolset for creating and running custom analysis and debugging tools on Android without modifying the app source code | 197 |
| An Android application analyzer tool that provides in-depth analysis and decompilation capabilities to identify sensitive information and vulnerabilities. | 153 |
| A software utility for analyzing and extracting data from Android devices without damaging them | 1,356 |
| Analyzes Android APKs to extract metadata and information about the app's behavior | 41 |
| An Android app analysis and validation tool | 1,019 |
| A tool for analyzing Android applications | 833 |
| Identifies how Android apps were made by analyzing compiled code and file formats | 2,096 |
| A testing tool for verifying the correctness of Java programs by generating input data and analyzing their execution | 102 |
| A framework to analyze and extract data from Android malware, providing actionable information about malicious code. | 102 |