Loading...

Looking for alternatives to RiskInDroid? RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores. Browse 20 similar Application Security tools below, compare features side-by-side, and find the best fit for your security stack.
Training course for Android and iOS mobile app security testing and exploitation
Android app protection tool with obfuscation, encryption, and RASP
Mobile app security solution protecting against reverse engineering & attacks
Codeless mobile app protection platform for Android and iOS applications
Runtime app protection for iOS & Android against tampering & malware
C# obfuscation & encryption tool for .NET, MAUI, and Xamarin apps
Redexer is a reengineering tool that parses, analyzes, and modifies Android DEX files for binary manipulation and permission analysis.
A modular Python tool that obfuscates Android applications by manipulating decompiled smali code, resources, and manifest files without requiring source code access.
A comprehensive Android application analysis tool that provides device management, logcat analysis, file examination, and integration with security frameworks like MobSF and JD-GUI.
Inspeckage is a dynamic analysis tool for Android applications that provides runtime behavior monitoring through API hooking and real-time system interaction tracking.
A web-based Android application dynamic analysis tool that provides real-time Frida instrumentation capabilities through a Flask interface with modular JavaScript hooking support.
Docker file for building Androguard dependencies with an optional interactive shell environment.
ReFlutter is a reverse engineering framework that uses patched Flutter libraries to enable dynamic analysis and traffic monitoring of Flutter mobile applications on Android and iOS platforms.
Andromeda makes reverse engineering of Android applications faster and easier.
Android security virtual machine with updated tools and frameworks for reverse engineering and malware analysis.
An Emacs major mode that provides syntax highlighting and enhanced readability for smali code files used in Android malware analysis.
MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.
Get strategic cybersecurity insights in your inbox