Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor. Aurasium's code is released under GPLv3. Code Structure: - ApkMonitor/: The main native and java policy logic, bundled with a demo app. - pyAPKRewriter/: The APK patching scripts. - dependencies/: pyAPKRewriter's dependencies - SecurityManager/: ASM for Aurasium Dependency Android SDK apt-get install unzip python python-pyasn1 Usage: To repackage an APK file: pyAPKRewriter/attach.sh source.apk [desktination.apk] To build a new version of Aurasium for repackaging: First build ApkMonitor/ under Eclispe. Then create an updated Aurasium blob by make in ApkMonitor/package. Finally copy aurasium.zip to dependencies/
FEATURES
SIMILAR TOOLS
Introspy-Android is a blackbox tool for understanding Android app behavior and identifying security issues at runtime.
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing, utilizing Message Query Language (MQL) for behavior description.
Runtime mobile exploration toolkit powered by Frida for assessing mobile app security without jailbreak.
Python tool for monitoring user-select APIs in Android apps using Frida.
AVEVA is an industrial software provider offering engineering, operations, and data management solutions for operational technology environments across various industrial sectors.
A collection of disposable and temporary email address domains used for spamming or abusing services.
Repository for apps to be used in Shuffle with compatibility instructions.
Open-source rules for detecting and preventing email attacks like BEC, malware, and credential phishing.
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.