Introspy-Android is a dynamic analysis framework designed for security testing of Android applications on rooted devices. The tool consists of two main components: a GUI interface for configuration and a Cydia Substrate extension that performs the core analysis functions. The framework operates by hooking security-sensitive Android APIs at runtime, allowing security researchers and analysts to monitor application behavior in real-time. It captures comprehensive data including function calls, arguments, and return values from targeted applications during execution. The tool performs automated security testing by analyzing the captured API calls for potential vulnerabilities and security issues. All findings and logged data are stored in a database and integrated with the Android logging system for persistence and further analysis. Introspy-Android includes the Introspy-Analyzer component, which processes the collected data from the tracer database. The analyzer generates detailed HTML reports that present both the complete log of function calls and identified potential vulnerabilities affecting the analyzed application. The framework requires root access on the target Android device and uses dynamic instrumentation techniques to monitor application behavior without requiring access to the application's source code.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Graphical Realism Framework for Industrial Control Simulation organized as 5 VirtualBox VMs for realistic ICS network simulation.
A data-mining and deep web asset search engine for breach analysis and prevention services.
A comprehensive collection of wordlists for bruteforcing and password cracking, covering various hashing algorithms and sizes.
A command line steganography tool that uses LSB technique to hide files within images without visible alteration.
Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.
Extract local data storage of an Android application in one click.
A platform for creating and managing fake phishing campaigns to raise awareness and train users to identify suspicious emails.
An open-source phishing toolkit for businesses and penetration testers.
A hardware security validation toolkit for x86 platforms that provides bootable tools for checking platform configuration registers and managing SecureBoot keys.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.