Skip to content

Updated Index.html #53

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: gh-pages
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
21 changes: 14 additions & 7 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ <h2><i class="fa fa-search"></i> Static Analysis Tools <a href="#static-analysis
</li>
<li>
<p><a href="https://github.com/hahwul/droid-hunter" target="_blank">droid-hunter</a> - Android application vulnerability analysis and pentesting tool.</p>
</li>
</li>
<li>
<p><a href="https://github.com/google/error-prone" target="_blank">Error-Prone</a> - Catch common Java mistakes as compile-time errors</p>
</li>
Expand Down Expand Up @@ -158,6 +158,13 @@ <h2><i class="fa fa-search"></i> Static Analysis Tools <a href="#static-analysis
<li>
<p><a href="https://github.com/JhetoX/VectorAttackScanner" target="_blank">VectorAttackScanner</a> - A tool to analyze Android apps to detect points to attack, such as intents, receivers, services, processes and libraries</p>
</li>
<li>
<p><a href="https://github.com/51j0/Android-Storage-Extractor" target="_blank">Android Storage Extractor</a> - A tool to extract local data storage of an Android application in one click</p>
</li>
<li>
<p><a href="https://github.com/51j0/Android-Screenshot" target="_blank">Android-Screenshot
</a> - A utility for pentesters to capture Android screenshot/POC via Computer </p>
</li>
</ul>
<a id="dynamic-analysis-tools" class="anchor" href="#dynamic-analysis-tools" aria-hidden="true"></a>
<h2><i class="fa fa-cogs"></i> Dynamic Analysis Tools <a href="#dynamic-analysis-tools"><span class="octicon octicon-link"></span></a></h2>
Expand All @@ -173,7 +180,7 @@ <h2><i class="fa fa-cogs"></i> Dynamic Analysis Tools <a href="#dynamic-analysis
</li>
<li>
<p><a href="https://github.com/idanr1986/cuckoo-droid" target="_blank">CuckooDroid</a> - An extension of Cuckoo Sandbox, CuckooDroid brings the capabilities of executing and analyzing Android applications to Cuckoo.</p>
</li>
</li>
<li>
<p><a href="https://code.google.com/p/droidbox/" target="_blank">Droidbox</a> - DroidBox is developed to offer dynamic analysis of Android applications</p>
</li>
Expand Down Expand Up @@ -266,7 +273,7 @@ <h2><i class="fa fa-backward"></i> Reverse Engineering Tools <a href="#reverse-e
</li>
<li>
<p><a href="https://github.com/skylot/jadx" target="_blank">JADX</a> - The JADX Dex to Java decompiler provides command line and GUI tools for producing Java source code from Android Dex and APK files.</p>
</li>
</li>
</ul>
<a id="hooking-tools" class="anchor" href="#hooking-tools" aria-hidden="true"></a>
<h2><i class="fa fa-indent"></i> Hooking Tools <a href="#hooking-tools"><span class="octicon octicon-link"></span></a></h2>
Expand Down Expand Up @@ -1427,13 +1434,13 @@ <h2><i class="fa fa-folder"></i> iOS Forensic Tools <a href="#iOS-forensic-tools
<li><p><a href="https://sourceforge.net/projects/iphoneanalyzer/" target="_blank">iPhone Analyzer</a> - iPhone Analzyer allows you to forensically examine or recover date from in iOS device.</p></li>
<li><a href="http://tools.kali.org/forensics/iphone-backup-analyzer" target="_blank">iPhone Backup Analyzer</a></li>
<li><a href="https://code.google.com/p/iphonebackupbrowser/" target="_blank">iPhone Backup Browser</a></li>
<li><p><a href="https://github.com/ptoomey3/Keychain-Dumper" target="_blank">Keychain Dumper</a> - A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken.</p></li>
<li><p><a href="https://github.com/ptoomey3/Keychain-Dumper" target="_blank">Keychain Dumper</a> - A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken.</p></li>
<li><p><a href="http://www.sleuthkit.org/mac-robber/index.php" target="_blank">Mac-robber</a> - mac-robber is a digital investigation tool that collects data from allocated files in a mounted file system. This is useful during incident response when analyzing a live system or when analyzing a dead system in a lab.</p></li>
<li><p><a href="http://mobilesyncbrowser.com/" target="_blank">Mobile Sync Browser</a> - Access your iOS backups</p></li>
<li><p><a href="https://www.blackbagtech.com/software-products/mobilyze.html" target="_blank">Mobilyze</a> - Mobilyze is a mobile data triage tool, designed to give users immediate access to data from iOS and Android devices. </p></li>
<li><a href="http://www.oxygen-forensic.com/en/" target="_blank">Oxygen Forensics Suite</a></li>
<li><p><a href="https://www.blackbagtech.com/software-products/mobilyze.html" target="_blank">Mobilyze</a> - Mobilyze is a mobile data triage tool, designed to give users immediate access to data from iOS and Android devices. </p></li>
<li><a href="http://www.oxygen-forensic.com/en/" target="_blank">Oxygen Forensics Suite</a></li>
<li><a href="https://www.paraben.com/device-seizure.html" target="_blank">Paraben Device Seizure</a></li>
<li><p><a href="http://www.sleuthkit.org/sleuthkit/" target="_blank">SleuthKit</a> - The Sleuth Kit® is a collection of command line tools and a C library that allows you to analyze disk images and recover files from them. It is used behind the scenes in Autopsy and many other open source and commercial forensics tools.</p></li>
<li><p><a href="http://www.sleuthkit.org/sleuthkit/" target="_blank">SleuthKit</a> - The Sleuth Kit® is a collection of command line tools and a C library that allows you to analyze disk images and recover files from them. It is used behind the scenes in Autopsy and many other open source and commercial forensics tools.</p></li>
</ul>
<a id="iOS-dynamic-analysis-tools" class="anchor" href="#iOS-dynamic-analysis-tools" aria-hidden="true" style="visibility: hidden"></a>
<h2><i class="fa fa-cogs"></i> iOS Dynamic Analysis Tools <a href="#iOS-dynamic-analysis-tools"><span class="octicon octicon-link"></span></a></h2>
Expand Down