Android Vulnerability Test Suite Logo

Android Vulnerability Test Suite

0
Free
Visit Website

This tool was meant to show the end user the attack surface that a given device is susceptible to. In implementing these checks we attempt to minimize or eliminate both false positives/false negatives without negatively affecting system stability. Rationale for necessity: When a vulnerability is discovered, Google receives word and applies a patch to Android. The Nexus devices are usually the devices that receive these patches quickest as they deviate the least (read: not at all) from AOSP (Android Open Source Project - The core of Android, where Google commits to). For example, the futex bug (CVE-2014-3153/Towelroot) was known about in late May, early June. This bug took multiple months to get patched on the flagship (at the time) Nexus 5. This leaves users extremely vulnerable to attack from applications. Users mostly do not know that their devices are vulnerable.

FEATURES

ALTERNATIVES

A tool for static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers

Vulnerable Android application for learning security concepts.

A vulnerability remediation platform that consolidates security findings, prioritizes risks using AI, and automates remediation workflows across cloud and application environments.

An Open Source supply chain security and auditing tool that tracks projects and dependencies, monitoring for vulnerabilities and issues.

An open source project for static analysis of vulnerabilities in application containers

The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.

A vulnerability management tool for macOS that monitors and detects vulnerabilities in over 100 apps.

List of publicly disclosed vulnerabilities with security filters and detailed advisories.