border: 1px solid #d2d2d2; padding: 0px 8px 0px 8px; color: #a19999; font-size: 12px; height: 25px; width: 165px; border-radius: 5px; -moz-border-radius: 5px; -webkit-border-radius: 5px; margin:0px; } .submitbutton{ background:#F66303; border: 1px solid #F66303; text-shadow: 1px 1px 1px #333; box-shadow: 3px 3px 3px #666; font:bold 12px Arial, sans-serif; color: #fff; height: 25px; padding: 0 12px 0 12px; margin: 0 0 0 5px; border-radius: 5px; -moz-border-radius: 5px; -webkit-border-radius: 5px; cursor:pointer;}

Receive all updates via Facebook. Just Click the Like Button Below

You can also receive Free Email Updates:

Powered By Blogger Widgets

Related Posts Plugin for WordPress, Blogger...

Tuesday, August 28, 2012

ARE: VM for Android malware analysis



ARE (Android Reverse Engineering) is a virtual machine with an int eresante set of tools to analyze different artifacts of Android malware in a secure environment. The image developed by a French group of the Honeynet Project runs in VirtualBox and comprises 10 tools, including Androguard and the Android SDK:

Androguard
Android SDK / NDK
APKInspector
Apktool
Axmlprinter
Ded
Dex2jar
Droidbox
Jad
Smali / Baksmali
Project website: http://redmine.honeynet.org/projects/are/wiki

1 comment:

  1. Thank you for captivate the time to publish this information very constructive! I’m still waiting for some appealing opinion from your side in your subsequent post and I will also advice my colleagues to follow your services. Still there are some true efficient businesses like you!

    buy movies online

    ReplyDelete

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More