Skip to content

Commit 93ed115

Browse files
committed
chore: update dead links
1 parent 6a6d7d7 commit 93ed115

File tree

2 files changed

+9
-4
lines changed

2 files changed

+9
-4
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,6 @@ A collection of Android security-related resources.
9898
1. [Androl4b](https://github.com/sh4hin/Androl4b)- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
9999
1. [House](https://github.com/nccgroup/house)- House: A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
100100
1. [Mobile-Security-Framework MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) - Mobile Security Framework is an intelligent, all-in-one open-source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.
101-
1. [AppUse](https://appsec-labs.com/AppUse/) – custom build for penetration testing
102101
1. [Droidbox](https://github.com/pjlantz/droidbox)
103102
1. [Drozer](https://github.com/mwrlabs/drozer)
104103
1. [Xposed](https://forum.xda-developers.com/xposed/xposed-installer-versions-changelog-t2714053) - equivalent of doing Stub-based code injection but without any modifications to the binary
@@ -128,6 +127,7 @@ A collection of Android security-related resources.
128127
1. [friTap](https://github.com/fkie-cad/friTap)- Intercept SSL/TLS connections with Frida; Allows TLS key extraction and decryption of TLS payload as PCAP on Android in real-time.
129128
1. [HacknDroid](https://github.com/RaffaDNDM/HacknDroid) - A tool designed to automate various Mobile Application Penetration Testing (MAPT) tasks and facilitate interaction with Android devices.
130129
1. [adbsploit](https://github.com/mesquidar/adbsploit) - tools for exploiting device via ADB
130+
1. ~~[AppUse](https://appsec-labs.com/AppUse/) – custom build for penetration testing~~
131131
1. ~~[Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on a USB stick or smartphone. This is a one-stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.~~
132132
1. ~~[Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals~~
133133
1. ~~[Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (Linux distro) Earlier, it used to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.php)~~
@@ -153,7 +153,6 @@ A collection of Android security-related resources.
153153
1. [Fino](https://github.com/sysdream/fino)
154154
1. [Frida](https://www.frida.re/) - inject JavaScript to explore applications and a [GUI tool](https://github.com/antojoseph/diff-gui) for it
155155
1. [Indroid](https://bitbucket.org/aseemjakhar/indroid) – thread injection kit
156-
1. [IntentSniffer](https://www.nccgroup.com/us/our-research/intent-sniffer/)
157156
1. [Introspy](https://github.com/iSECPartners/Introspy-Android)
158157
1. [Jad]( https://varaneckas.com/jad/) - Java decompiler
159158
1. [JD-GUI](https://github.com/java-decompiler/jd-gui) - Java decompiler
@@ -176,6 +175,7 @@ A collection of Android security-related resources.
176175
1. [odex-patcher](https://github.com/giacomoferretti/odex-patcher) - Run arbitrary code by patching OAT files
177176
1. [PhoneSpolit-Pro](https://github.com/AzeemIdrisi/PhoneSploit-Pro) - An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit Framework to get a Meterpreter session.
178177
1. [APKLab](https://github.com/APKLab/APKLab) - plugin for VS code to analyze APKs
178+
1. ~~[IntentSniffer](https://www.nccgroup.com/us/our-research/intent-sniffer/)~~
179179
1. ~~[Procyon](https://bitbucket.org/mstrobel/procyon/wiki/Java%20Decompiler) - Java decompiler~~
180180
1. ~~[Smali viewer](http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip)~~
181181
1. ~~[ZjDroid](https://github.com/BaiduSecurityLabs/ZjDroid)~~, ~~[fork/mirror](https://github.com/yangbean9/ZjDroid)~~

run_awesome_bot.sh

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,21 +31,26 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/',
3131
'https://www.android-device-security.org/client/datatable',\
3232
'http://pralab.diee.unica.it/en/AndroidPRAGuardDataset',\
3333
'https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/',\
34+
'https://www.nccgroup.com/us/our-research/intent-sniffer/',\
3435
'https://www.sec.tu-bs.de/~danarp/drebin/',\
3536
'https://apkpure.com',\
3637
'https://approver.talos-sec.com',\
3738
'https://wiki.sei.cmu.edu/confluence/display/android/Android+Secure+Coding+Standard',\
3839
'https://web.archive.org/web/20180721134044/http://www.fasteque.com:80/android-reverse-engineering-101-part-1/',\
3940
'https://manifestsecurity.com/appie/',\
40-
'https://www.cs.washington.edu/sparta'
41+
'https://www.cs.washington.edu/sparta',\
42+
'https://appsec-labs.com/AppUse/',
43+
4144

4245
FLAKY_URLS='http://safe.ijiami.cn/',\
4346
'https://apkcombo.com/apk-downloader/',\
4447
'https://www.nowsecure.com/',\
4548
'https://www.immuniweb.com/mobile/',\
4649
'https://img.shields.io/github/contributors/ashishb/android-security-awesome',\
4750
'https://security.csl.toronto.edu/pscout/',\
48-
'https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/Google-Android.html'
51+
'https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/Google-Android.html',\
52+
'http://kharon.gforge.inria.fr/dataset/',\
53+
'https://insights.sei.cmu.edu/library/didfail/'
4954

5055

5156
SRC_FILE=README.md

0 commit comments

Comments
 (0)