From 4c0fbeaa1d19dcb31016f09f9a44d8ec9157f803 Mon Sep 17 00:00:00 2001 From: "O . S . O" Date: Mon, 5 Dec 2016 00:30:27 +0100 Subject: [PATCH] Added 'Inspeckage' (Xposed Module) --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 93920a8..4029485 100644 --- a/README.md +++ b/README.md @@ -71,6 +71,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic * [Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/) * [Drozer](https://labs.mwrinfosecurity.com/tools/drozer/) * [Xposed](https://forum.xda-developers.com/showthread.php?t=1574401) - equivalent of doing Stub based code injection but without any modifications to the binary +* [Inspeckage](https://github.com/ac-pm/Inspeckage) - Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module) * [Android Hooker](https://github.com/AndroidHooker/hooker) - Dynamic Java code instrumentation (requires the Substrate Framework) * [ProbeDroid](https://github.com/ZSShen/ProbeDroid) - Dynamic Java code instrumentation * [Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals