NowSecure Lab Automated - Enterprise tool for mobile app security testing both Android and iOS mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes. Not free
App Detonator - Detonate APK binary to provide source code level details including app author, signature, build and manifest information. 3 Analysis/day free quota.
RiskInDroid - A tool for calculating the risk of Android apps based on their permissions, with online demo available.
SUPER - Secure, Unified, Powerful and Extensible Rust Android Analyzer
ClassyShark - Standalone binary inspection tool which can browse any Android executable and show important infos.
StaCoAn - Crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications. This tool was created with a big focus on usability and graphical guidance in the user interface.
JAADAS - Joint intraprocedure and interprocedure program analysis tool to find vulnerabilities in Android apps, built on Soot and Scala
Quark-Engine - An Obfuscation-Neglect Android Malware Scoring System
Androl4b- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
House- House: A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
Mobile-Security-Framework MobSF - Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.
Appie - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on USB stick or smartphone. This is a one stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
StaDynA - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information.
ARTist - a flexible open source instrumentation and hybrid analysis framework for Android apps and Android's java middleware. It is based on the Android Runtime's (ART) compiler and modifies code during on-device compilation.
AndroPyTool - a tool for extracting static and dynamic features from Android APKs. It combines different well-known Android apps analysis tools such as DroidBox, FlowDroid, Strace, AndroGuard or VirusTotal analysis.
Obfuscapk - Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code.
ARMANDroid - ARMAND (Anti-Repackaging through Multi-patternAnti-tampering based on Native Detection) is a novel anti-tampering protection scheme that embeds logic bombs and AT detection nodes directly in the apk file without needing their source code.
MVT (Mobile Verification Toolkit) - a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices
Apkpure - Online apk downloader. Provides also an own app for downloading.
PlaystoreDownloader - PlaystoreDownloader is a tool for downloading Android applications directly from the Google Play Store. After an initial (one-time) configuration, applications can be downloaded by specifying their package name.
APK Downloader Online Sevrice to download APK from Playstore for specific Android Device Configuration
~~Mobile Security Reading Room - A reading room which contains well categorised technical reading material about mobile penetration testing, mobile malware, mobile forensics and all kind of mobile security related topics~~