Andromeda

Android analyzer

A tool for analyzing and reverse-engineering Android applications

Andromeda - Interactive Reverse Engineering Tool for Android Applications

GitHub

702 stars
26 watching
76 forks
Language: C++
last commit: over 4 years ago
androidapkbinary-analysisreverse-engineeringstatic-analysis

Related projects:

Repository Description Stars
alexmyg/andropytool A tool for analyzing Android applications to extract static and dynamic features 355
frenchyeti/dexcalibur A tool for analyzing and reverse engineering Android applications using dynamic instrumentation automation and Frida. 1,059
den4uk/andriller A software utility for analyzing and extracting data from Android devices without damaging them 1,343
ucsb-seclab/baredroid A tool for analyzing bare-metal Android devices 91
notsosecure/android_application_analyzer An Android application analyzer tool that provides in-depth analysis and decompilation capabilities to identify sensitive information and vulnerabilities. 154
abhi-r3v0/adhrit An Android security analysis tool that uses Ghera benchmarks to identify vulnerability patterns in applications. 537
rednaga/apkid Identifies how Android apps were made by analyzing compiled code and file formats 2,070
mingyuan-xia/patdroid An Android-specific toolkit for analyzing and understanding APK files 118
cmu-sei/pharos Automated analysis tool for understanding and recovering program structure from compiled binaries 1,557
dweinstein/dockerfile-androguard A Dockerfile and script to analyze Android apps using the Androguard toolset. 41
te-k/apkcli Analyzes Android APKs to extract metadata and information about the app's behavior 41
google/dexmod Tool to analyze and modify Android bytecode for security research and analysis 49
a-yatta/amdh Automates scanning and hardening of Android devices to detect malware and protect user privacy. 201
maaaaz/androwarn Analyze Android app malice and detect malicious behaviors 484
julianschuette/condroid A tool that performs symbolic and concrete execution of Android apps to analyze behavior at specific code locations 56