xtiankisutsa / MARA_Framework
MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile application reverse engineering and analysis tools to assist in testing mobile applications against the OWASP mobile security threats.
☆637Updated 5 years ago
Alternatives and similar repositories for MARA_Framework:
Users that are interested in MARA_Framework are comparing it to the libraries listed below
- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis☆1,127Updated last year
- Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.☆541Updated 2 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆588Updated 4 years ago
- One-Step APK Decompilation With Multiple Backends☆265Updated 4 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,086Updated 2 years ago
- Yet another static code analyzer for malicious Android applications☆495Updated 5 years ago
- DIVA Android - Damn Insecure and vulnerable App for Android☆1,010Updated last year
- ☆611Updated 2 years ago
- Quickly analyze and reverse engineer Android packages☆781Updated 2 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆289Updated 6 years ago
- AndroBugs Framework is an efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilitie…☆1,165Updated 5 years ago
- Droidefense: Advance Android Malware Analysis Framework☆481Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆284Updated 7 years ago
- Dynamic analysis of Android apps☆772Updated last year
- StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile ap…☆844Updated 3 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆321Updated 7 years ago
- Android App Security Checklist☆869Updated 2 years ago
- A framework for automated extraction of static and dynamic features from Android applications☆367Updated 2 years ago
- Static Code Analysis for Smali files☆322Updated 5 years ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the p…☆1,052Updated 2 years ago
- Mobile penetration testing android & iOS command cheatsheet☆361Updated 4 months ago
- Penetration testing and auditing toolkit for Android apps.☆239Updated last month
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆263Updated 6 years ago
- Ninja Reverse Engineering on Android APK packages☆278Updated 9 months ago
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,432Updated 3 years ago
- A collection of reverse engineering challenges for learning about the Android operating system and mobile security.☆363Updated 4 years ago
- The tool is used to analyze the content of the android application in local storage.☆161Updated 3 weeks ago
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,183Updated last week
- Radare2 and Frida better together.☆1,255Updated last week
- The iOS Security Testing Framework☆1,355Updated 4 years ago