MARA FRAMEWORK V0.2(BETA) – MOBILE APPLICATION REVERSE ENGINEERING & ANALYSIS FRAMEWORK.
Ken-Pachi / August 12, 2016 / Comments Off on Mara framework v0.2(beta) – Mobile Application Reverse Engineering & Analysis Framework. / Android Tools, Anti Malware/Virus – Malware Analysis, Encryption, Framework, Registry Analysis, Security Tools
Changelog v0.2(beta):
* Adding Preliminary Analysis (*new Features)
* Adding APK Manifest Analysis (*new Features)
* Tools Update
tools/editors/com.maskyn.fileeditor-59.apk
tools/editors/sublime-text_build-3114_amd64.deb
* setup.sh
* mara.sh
Mara Framework v0.2
MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering toolsets, in order to make the task or reverse engineering and analysis easier and friendly to mobile application developers and security professionals.
Mara
Features supported:
* APK Reverse engineering
Disassembling Dalvik bytecode to smali bytecode via baksmali and apktool
Disassembling Dalvik bytecode to java bytecode via enjarify
Decompiling APK to Java source code via jadx
* Preliminary Analysis
arsing smali files for analysis via smalisca
Dump apk assets,libraries and resources
Extracting certificate data via openssl
Extract strings and app permissions via aapt
Identify methods and classes via ClassyShark
Scan for apk vulnerabilities via androbugs
Analyze apk for potential malicious behaviour via androwarn
Identify compilers, packers and obfuscators via APKiD
Extract execution paths, IP addresses, URL, URI, emails via regex
Domain SSL scan via pyssltest and testssl
* APK Manifest Analysis
Extract Intents
Extract exported activities
Extract receivers
Extract exported receivers
Extract Services
Extract exported services
Check if apk is debuggable
Check if apk allows backups
Check if apk allows sending of secret codes
Check if apk can receive binary SMS
Source : https://github.com/xtiankisutsa/MARA_Framework
Changelog v0.2(beta):
* Adding Preliminary Analysis (*new Features)
* Adding APK Manifest Analysis (*new Features)
* Tools Update
tools/editors/com.maskyn.fileeditor-59.apk
tools/editors/sublime-text_build-3114_amd64.deb
* setup.sh
* mara.sh
Mara Framework v0.2
MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering toolsets, in order to make the task or reverse engineering and analysis easier and friendly to mobile application developers and security professionals.
Mara
Features supported:
* APK Reverse engineering
Disassembling Dalvik bytecode to smali bytecode via baksmali and apktool
Disassembling Dalvik bytecode to java bytecode via enjarify
Decompiling APK to Java source code via jadx
* Preliminary Analysis
arsing smali files for analysis via smalisca
Dump apk assets,libraries and resources
Extracting certificate data via openssl
Extract strings and app permissions via aapt
Identify methods and classes via ClassyShark
Scan for apk vulnerabilities via androbugs
Analyze apk for potential malicious behaviour via androwarn
Identify compilers, packers and obfuscators via APKiD
Extract execution paths, IP addresses, URL, URI, emails via regex
Domain SSL scan via pyssltest and testssl
* APK Manifest Analysis
Extract Intents
Extract exported activities
Extract receivers
Extract exported receivers
Extract Services
Extract exported services
Check if apk is debuggable
Check if apk allows backups
Check if apk allows sending of secret codes
Check if apk can receive binary SMS
1 2 3 4 5 6 | git clone https://github.com/xtiankisutsa/MARA_Framework && cd MARA_Framework sudo ./setup.sh sudo ./mara.sh Upgrade: git pull origin master |
Source : https://github.com/xtiankisutsa/MARA_Framework
Comments
Post a Comment