Aurasium Logo

Aurasium

0
Free
Visit Website

Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor. Aurasium's code is released under GPLv3. Code Structure: - ApkMonitor/: The main native and java policy logic, bundled with a demo app. - pyAPKRewriter/: The APK patching scripts. - dependencies/: pyAPKRewriter's dependencies - SecurityManager/: ASM for Aurasium Dependency Android SDK apt-get install unzip python python-pyasn1 Usage: To repackage an APK file: pyAPKRewriter/attach.sh source.apk [desktination.apk] To build a new version of Aurasium for repackaging: First build ApkMonitor/ under Eclispe. Then create an updated Aurasium blob by make in ApkMonitor/package. Finally copy aurasium.zip to dependencies/

FEATURES

ALTERNATIVES

Android security virtual machine with updated tools and frameworks for reverse engineering and malware analysis.

Android application for learning about vulnerabilities in modern Android apps and testing pentesting skills.

An Outlook add-in for reporting suspicious emails to security teams and tracking user behavior during awareness campaigns.

MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.

A platform for creating and managing fake phishing campaigns to raise awareness and train users to identify suspicious emails.

Runtime mobile exploration toolkit powered by Frida for assessing mobile app security without jailbreak.

Leveraging WebDAV features for covert communication and payload delivery.

Industrial control system automation and testing tool for SCADA security testing.