Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor. Aurasium's code is released under GPLv3. Code Structure: - ApkMonitor/: The main native and java policy logic, bundled with a demo app. - pyAPKRewriter/: The APK patching scripts. - dependencies/: pyAPKRewriter's dependencies - SecurityManager/: ASM for Aurasium Dependency Android SDK apt-get install unzip python python-pyasn1 Usage: To repackage an APK file: pyAPKRewriter/attach.sh source.apk [desktination.apk] To build a new version of Aurasium for repackaging: First build ApkMonitor/ under Eclispe. Then create an updated Aurasium blob by make in ApkMonitor/package. Finally copy aurasium.zip to dependencies/
FEATURES
ALTERNATIVES
GridPot is a cybersecurity tool that integrates GridLAB-D, Conpot, and libiec61850 to simulate and detect attacks on industrial control systems (ICS).
Open-source rules for detecting and preventing email attacks like BEC, malware, and credential phishing.
A Python tool for patching Dalvik bytecode in DEX files and assisting in Android application analysis
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.
House: A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
A data-mining and deep web asset search engine for breach analysis and prevention services.
Runtime mobile exploration toolkit powered by Frida for assessing mobile app security without jailbreak.
Aggregates known Android security vulnerabilities with detailed examples and analysis.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.