DroidBox is a dynamic analysis framework designed for Android applications that provides comprehensive behavioral monitoring and analysis capabilities. The tool captures and analyzes various aspects of Android application behavior during runtime execution, including network communications, file system operations, service activities, and security-related events. Key analysis features include: - Hash generation for analyzed packages - Network traffic monitoring for incoming and outgoing data - File read and write operation tracking - Service startup and DexClassLoader class loading detection - Information leak identification through network, file, and SMS channels - Permission circumvention detection - Cryptographic operation monitoring using Android API - Broadcast receiver enumeration - SMS and phone call activity logging The framework generates two visualization graphs to represent application behavior: - Temporal operation sequence visualization showing the chronological order of activities - Treemap visualization for comparing behavioral similarities between analyzed packages DroidBox requires the Android SDK and Python libraries (pylab and matplotlib) for operation. The tool has been tested on Linux and Mac OS platforms and provides export functionality for SDK tools and platform-tools paths.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A sandbox for quickly sandboxing known or unknown families of Android Malware
A program to manage yara ruleset in a database with support for different databases and configuration options.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
A .NET assembly debugger and editor that enables reverse engineering and dynamic analysis of compiled .NET applications without source code access.