Inspeckage is a dynamic analysis tool designed for Android applications that provides runtime behavior insights through API function hooking. The tool analyzes Android applications by intercepting and monitoring various system calls and API interactions during execution. It extracts comprehensive application metadata including permissions, shared libraries, activities, content providers, broadcast receivers, services, debuggability status, and version information. Inspeckage offers real-time monitoring capabilities across multiple Android subsystems: - Shared preferences access and modifications - Serialization and deserialization operations - Cryptographic functions and hash calculations - SQLite database interactions - HTTP network communications - File system operations and access patterns - Clipboard usage monitoring - URL parsing activities - WebView interactions - Inter-process communication (IPC) monitoring The tool supports dynamic hook injection, allowing security researchers to add custom monitoring points during runtime analysis. This functionality enables detailed examination of application behavior patterns and potential security vulnerabilities without requiring source code access.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
A sandbox for quickly sandboxing known or unknown families of Android Malware
A program to manage yara ruleset in a database with support for different databases and configuration options.
A static analysis tool for PE files that identifies potential malicious indicators through compiler detection, packing analysis, signature matching, and suspicious string identification.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
Code to prevent a managed .NET debugger/profiler from working.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.