border: 1px solid #d2d2d2; padding: 0px 8px 0px 8px; color: #a19999; font-size: 12px; height: 25px; width: 165px; border-radius: 5px; -moz-border-radius: 5px; -webkit-border-radius: 5px; margin:0px; } .submitbutton{ background:#F66303; border: 1px solid #F66303; text-shadow: 1px 1px 1px #333; box-shadow: 3px 3px 3px #666; font:bold 12px Arial, sans-serif; color: #fff; height: 25px; padding: 0 12px 0 12px; margin: 0 0 0 5px; border-radius: 5px; -moz-border-radius: 5px; -webkit-border-radius: 5px; cursor:pointer;}

Receive all updates via Facebook. Just Click the Like Button Below

You can also receive Free Email Updates:

Powered By Blogger Widgets

Related Posts Plugin for WordPress, Blogger...

Pages

Tuesday, August 28, 2012

ARE: VM for Android malware analysis



ARE (Android Reverse Engineering) is a virtual machine with an int eresante set of tools to analyze different artifacts of Android malware in a secure environment. The image developed by a French group of the Honeynet Project runs in VirtualBox and comprises 10 tools, including Androguard and the Android SDK:

Androguard
Android SDK / NDK
APKInspector
Apktool
Axmlprinter
Ded
Dex2jar
Droidbox
Jad
Smali / Baksmali
Project website: http://redmine.honeynet.org/projects/are/wiki

1 comment:

  1. Thank you for captivate the time to publish this information very constructive! I’m still waiting for some appealing opinion from your side in your subsequent post and I will also advice my colleagues to follow your services. Still there are some true efficient businesses like you!

    buy movies online

    ReplyDelete

Follow Us

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More