October 8, 2024

Author: Anthony Desnos

Archives

ARE Virtual Machine – Honeynet Project

In the field of mobile security, researchers need advanced tools to analyze malware and securely test Android applications. One such tool is the ARE Virtual Machine, developed as part of the Honeynet Project. This tool provides a secure and efficient environment for deeper analysis of Android malware, helping experts gain insights into malicious behavior without […]

Read More
Archives

Androguard Documentation

Androguard is a widely used open-source tool designed to help security researchers and developers analyze Android application bytecode, including DEX, ODEX, and APK files. Written in Python, Androguard offers powerful features for detecting security vulnerabilities and understanding the behavior of Android applications. In this article, we provide a concise guide on how to use Androguard […]

Read More
Archives

Installation Guide for Androguard

Androguard is an open-source tool designed to help security researchers and developers analyze Android application bytecode, such as DEX, ODEX, and APK files. Written in Python, Androguard is widely used for detecting security vulnerabilities and analyzing the behavior of Android apps. This guide provides a step-by-step process to install Androguard on your system and start […]

Read More
Archives

Google Play Protect: Keeping Your Android Device Safe

In the digital age, mobile devices have become prime targets for hackers, and with millions of apps on the Google Play Store, Android users are at risk from malicious apps. To counter these threats, Google Play Protect was developed as a comprehensive security system built into all Android devices, helping detect and block apps containing […]

Read More
Archives

Tizi: Detecting and Blocking Socially Engineered Spyware

In today’s digital age, mobile devices like Android are frequent targets of cyber threats. One such threat is Tizi, a spyware discovered in 2017. Tizi specifically targets Android users’ social media accounts, including Facebook, Twitter, and WhatsApp, through sophisticated social engineering tactics. Once installed, Tizi can steal personal data and take control of the user’s […]

Read More