DroidBox is a dynamic analysis framework designed for Android applications that provides comprehensive behavioral monitoring and analysis capabilities. The tool captures and analyzes various aspects of Android application behavior during runtime execution, including network communications, file system operations, service activities, and security-related events. Key analysis features include: - Hash generation for analyzed packages - Network traffic monitoring for incoming and outgoing data - File read and write operation tracking - Service startup and DexClassLoader class loading detection - Information leak identification through network, file, and SMS channels - Permission circumvention detection - Cryptographic operation monitoring using Android API - Broadcast receiver enumeration - SMS and phone call activity logging The framework generates two visualization graphs to represent application behavior: - Temporal operation sequence visualization showing the chronological order of activities - Treemap visualization for comparing behavioral similarities between analyzed packages DroidBox requires the Android SDK and Python libraries (pylab and matplotlib) for operation. The tool has been tested on Linux and Mac OS platforms and provides export functionality for SDK tools and platform-tools paths.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A .NET assembly debugger and editor that enables reverse engineering and dynamic analysis of compiled .NET applications without source code access.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A static analysis tool for PE files that identifies potential malicious indicators through compiler detection, packing analysis, signature matching, and suspicious string identification.
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.