StaDynA Logo

StaDynA

0
Free
Visit Website

StaDynA is a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). Our tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information. This work has been done at the University of Trento. Publication: The results of our research were presented at the 5th ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2015). Please use the following bibtex reference to cite our paper: @inproceedings{StaDynA_Zhauniarovich2014, author = {Zhauniarovich, Yury and Ahmad, Maqsood and Gadyatskaya, Olga and Crispo, Bruno and Massacci, Fabio}, title = {{StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications}}, booktitle = {Proceedings of the 5th ACM Conference on Data and Application Security and Privacy}, series = {CODASP

FEATURES

ALTERNATIVES

Python tool for monitoring user-select APIs in Android apps using Frida.

NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.

An open source framework for security assessments of iOS apps, now decommissioned in favor of Objection.

An open-source phishing toolkit for businesses and penetration testers.

CHIPSEC is a framework for analyzing the security of PC platforms and components, with tools for low-level interfaces and forensic capabilities.

Alternative marketplace for mobile applications with package ID metadata retrieval and APK download capabilities.

Detects and handles potential malware in Microsoft Exchange 2019 messages with various techniques and third-party libraries.

Innovative tool for mobile security researchers to analyze targets with static and dynamic analysis capabilities and sharing functionalities.

PINNED