ConDroid
Android analyzer
A tool that performs symbolic and concrete execution of Android apps to analyze behavior at specific code locations
Symbolic/concolic execution of Android apps
56 stars
6 watching
13 forks
Language: Java
last commit: over 9 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A tool for analyzing and reverse engineering Android applications using dynamic instrumentation automation and Frida. | 1,063 |
| | A tool for analyzing Android applications to extract static and dynamic features | 356 |
| | Analyzes Android app behavior to detect security vulnerabilities and malicious activities | 761 |
| | An Android-specific toolkit for analyzing and understanding APK files | 118 |
| | A tool for analyzing and reverse-engineering Android applications | 702 |
| | A tool for analyzing bare-metal Android devices | 91 |
| | A toolset for creating and running custom analysis and debugging tools on Android without modifying the app source code | 197 |
| | An Android application analyzer tool that provides in-depth analysis and decompilation capabilities to identify sensitive information and vulnerabilities. | 153 |
| | A software utility for analyzing and extracting data from Android devices without damaging them | 1,356 |
| | Analyzes Android APKs to extract metadata and information about the app's behavior | 41 |
| | An Android app analysis and validation tool | 1,019 |
| | A tool for analyzing Android applications | 833 |
| | Identifies how Android apps were made by analyzing compiled code and file formats | 2,096 |
| | A testing tool for verifying the correctness of Java programs by generating input data and analyzing their execution | 102 |
| | A framework to analyze and extract data from Android malware, providing actionable information about malicious code. | 102 |