drozer Logo

Top Alternatives to drozer

Application Security

drozer is an open source Android security testing framework that identifies vulnerabilities in mobile apps and devices through Android Runtime and IPC endpoint interaction.

124 Alternatives to drozer

APKLeaks is a command-line tool that scans Android APK files to identify embedded URIs, endpoints, and secrets for security assessment purposes.

Mobile security testing platform for Android and iOS apps with SAST and DAST

ImmuniWeb MobileSuite is a mobile application penetration testing platform that combines AI-powered automation with manual security testing to assess mobile apps and their backend infrastructure for security vulnerabilities and compliance requirements.

AI-enhanced mobile app security scanner for Android & iOS with SAST/DAST

Mobile app security testing platform for Android and iOS apps

AppSec platform for mobile, web, API & cloud security testing & protection

Mobile app security testing and runtime protection platform

App security platform with code obfuscation, RASP, and threat monitoring

App threat monitoring & analytics for web, mobile, and desktop applications

Desktop & server app hardening with obfuscation, RASP, and threat monitoring

White-box cryptography solution protecting encryption keys and data in apps

Mobile app security platform with code obfuscation, RASP, and monitoring

Unified mobile app security platform with SAST, DAST, and API testing

AI-powered mobile app security platform with SAST, DAST, and API testing

AI-powered mobile app security platform with SAST, DAST, and API testing

Training course for Android and iOS mobile app security testing and exploitation

Mobile app security testing platform for Android and iOS applications

Mobile app security testing combining vuln assessment, pentesting & forensics

Android app protection tool with obfuscation, encryption, and RASP

Real-time mobile threat detection and monitoring platform with RASP integration

Mobile app security testing tool with static & interactive analysis

Server-side mobile app attestation verifying app integrity and API access

Risk assessment platform for third-party mobile apps in enterprise networks

Android app security validation service for Google Play MASA certification

Automated mobile app security testing platform for iOS and Android apps

Mobile app risk management platform for data security and privacy testing

Mobile app security testing platform for identifying data security risks

Mobile app security testing platform for business-critical applications

Mobile app security solution protecting against reverse engineering & attacks

Mobile app security audit service for Android and iOS applications

Mobile app security platform for DevSecOps teams across app lifecycle

Agentic AI platform that automates 400+ security defenses into Android and iOS mobile

Cybersecurity platform for mobile and IoT apps with SDK, gateway, and PKI

Mobile app security platform for enterprises across multiple industries

Codeless mobile app protection platform for Android and iOS applications

Runtime app protection for iOS & Android against tampering & malware

JavaScript obfuscation tool for protecting code from reverse engineering

C# obfuscation & encryption tool for .NET, MAUI, and Xamarin apps

Java, Android, and Kotlin app obfuscation and hardening tool

RASP solution securing mobile apps and APIs across Android, iOS, and HarmonyOS at runtime.

Mobile app security testing service using VAPT, static & dynamic analysis

AI-powered mobile app security platform with device binding and threat detection

Mobile app protection with runtime verification and threat detection

Mobile app threat intelligence platform with cloud-based detection & response

AI-driven mobile app hardening with cryptographic individualization

Mobile app SSL certificate pinning solution with dynamic configuration

Mobile app shielding and in-app protection for mobile applications

Korean cybersecurity firm offering mobile, network, app, and DB security products.

Android app dynamic behavior analysis system using sandbox technology.

Mobile app security audit covering code review, DAST, SAST, and pentesting.

Runtime RASP platform securing Android & iOS apps with no-code deployment.

Binary-level firmware protection for embedded systems, no source code needed.

Firmware & software protection against reverse engineering for embedded systems.

Android SDK for device fingerprinting to detect and prevent mobile app fraud.

Ad ecosystem security platform blocking malvertising, redirects & mobile threats.

Device-independent, hardware-grade security platform for mobile payment tokenization.

SDK-free edge-deployed bot protection for mobile apps across all versions.

Mobile app security testing using SAST, DAST, IAST, SCA & fuzzing.

APKiD is a tool that identifies compilers, packers, obfuscators, and other weird stuff in APK files.

Web-based tool for browsing mobile applications sandbox and previewing SQLite databases.

Code to prevent a managed .NET debugger/profiler from working.

A Java-based API tool for programmatically searching and downloading Android applications from Google Play Store with Galaxy S3 device compatibility.

AndroBugs Framework is an Android vulnerability analysis system that scans mobile applications for security vulnerabilities, missing best practices, and dangerous shell commands.

An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.

A modular Python tool that obfuscates Android applications by manipulating decompiled smali code, resources, and manifest files without requiring source code access.

RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.

Integrates static APK analysis with Yara and requires re-compilation of Yara with the androguard module.

A comprehensive Android application analysis tool that provides device management, logcat analysis, file examination, and integration with security frameworks like MobSF and JD-GUI.

Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.

A command-line Android APK vulnerability analyzer written in Rust that decompresses and scans APK files using rule-based detection to identify security issues.

A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.

Dynamic Java code instrumentation kit for Android applications.

A tool for extracting static and dynamic features from Android APKs.

A full python tool for analyzing Android files with various functionalities.

A web-based Android application dynamic analysis tool that provides real-time Frida instrumentation capabilities through a Flask interface with modular JavaScript hooking support.

A security checklist based on OWASP standards that provides comprehensive guidelines for designing, testing, and releasing secure Android applications.

Python wrapper for Android APK decompilation with various converter and decompiler options.

idb is a tool that simplifies iOS penetration testing and security research tasks, available in both command line and GUI versions.

CFGScanDroid is a Java utility that compares control flow graph signatures to Android method control flow graphs for malicious application detection.

AppMon is a Frida-based automated framework for monitoring and tampering with system API calls across macOS, iOS, and Android applications.

ELFcrypt encrypts ELF binaries with obfuscation and anti-debugging features to protect against reverse engineering.

Docker file for building Androguard dependencies with an optional interactive shell environment.

A command-line tool for downloading Android APK files from the Appland platform via npm installation.

Node library for calling Google Play APIs with Nexus device behavior.

An unofficial Python API that enables programmatic searching, browsing, and downloading of Android apps from Google Play Store.

A lightweight library for device identification and fingerprinting, written in Kotlin and 100% crash-free.

A standalone binary inspection tool for Android developers with support for various formats and dependencies.

A Python tool for patching Dalvik bytecode in DEX files and assisting in Android application analysis

A tool for translating Dalvik bytecode to Java bytecode for analyzing Android applications.

CuckooDroid extends Cuckoo Sandbox to provide automated dynamic analysis of Android applications in a controlled sandbox environment.

A deliberately vulnerable Android application containing multiple security flaws designed for educational purposes and security training.

DVHMA is an intentionally vulnerable Android hybrid mobile app built with Apache Cordova for security testing and educational purposes.

One stop shop for decompiling Android apps with a focus on regenerating R references.

Runtime Mobile Security (RMS) is a powerful web interface powered by FRIDA for manipulating Android and iOS Apps at Runtime.

Androwarn performs static analysis of Android applications using Dalvik bytecode examination to detect and report potentially malicious behaviors.

Mobile Audit is a Docker-based SAST and malware analysis tool that performs comprehensive security analysis of Android APK files, including vulnerability detection, certificate verification, and Virus Total integration.

Needle is a discontinued open source modular framework for iOS application security assessments that was compatible with iOS 9 and iOS 10 before being replaced by Objection.

Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis with various tools and resources.

XGuardian XARA Security Scanner for OSX with URL scheme, Bundle ID, and keychain hijack checks.

DroidBox is a dynamic analysis framework for Android applications that monitors runtime behavior, network activity, file operations, and security events while generating behavioral visualizations.

Redexer is a reengineering tool that parses, analyzes, and modifies Android DEX files for binary manipulation and permission analysis.

ReFlutter is a reverse engineering framework that uses patched Flutter libraries to enable dynamic analysis and traffic monitoring of Flutter mobile applications on Android and iOS platforms.

Tools for working with Android .dex and Java .class files, including dex-reader/writer, d2j-dex2jar, and smali/baksmali.

Innovative tool for mobile security researchers to analyze targets with static and dynamic analysis capabilities and sharing functionalities.

Andromeda makes reverse engineering of Android applications faster and easier.

Runtime mobile exploration toolkit powered by Frida for assessing mobile app security without jailbreak.

Android security virtual machine with updated tools and frameworks for reverse engineering and malware analysis.

Automates the process of preparing Android APK files for HTTPS inspection

An Emacs major mode that provides syntax highlighting and enhanced readability for smali code files used in Android malware analysis.

A Scriptable Android Debugger for reverse engineers and developers.

MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.

A security policy enforcement framework for Android applications that uses bytecode rewriting and in-place reference monitoring to inject security controls into APK files.

FSquaDRA detects repackaged Android applications by computing Jaccard similarity over file digests within APK packages using pre-computed signing digests for improved performance.

StaDynA is a system supporting security app analysis in the presence of dynamic code update features.

Original SmaliHook Java source for Android cracking and reversing.

App-Ray offers comprehensive security analysis and compliance solutions for mobile applications.

A tool for reverse engineering Android apk files.

A set of instructions for the Dalvik virtual machine to manipulate registers and values in Android applications.

A command-line utility for examining Objective-C runtime information in Mach-O files and generating class declarations.

A collection of Android Applications with malware analysis results

A tool for dynamic analysis of mobile applications in a controlled environment.

A VM for mobile application security testing, Android and iOS applications, with custom-made tools and scripts.

An open-source tool for detecting and analyzing Android apps' vulnerabilities and security issues.