lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 07 Apr 2015 19:04:52 +0200 From: Levon Kayan <noptrix@...lsecurity.net> To: fulldisclosure@...lists.org Subject: [FD] New tool: smalisca - Static Code Analysis tool for Smali files Hi, Today, nullsecurity released a new tool: smalisca. [ DESCRIPTION ] Static Code Analysis tool for Smali files. If you ever have looked at Android applications you know to appreciate the ability of analyzing your target at the most advanced level. Dynamic programm analysis will give you a pretty good overview of your applications activities and general behaviour. However sometimes you’ll want to just analyze your application *without* running it. You’ll want to have a look at its components, analyze how they interact and how data is tainted from one point to another. This is was the major factor driving the development of /smalisca/. There are indeed some good reasons for a /static code analysis/ before the /dynamic/ one. Before interacting with the application I like to know how the application has been build, if there is any API and generate all sort of /call flow graphs/. In fact graphs have been very important to me since they /visualize/ things. Instead of jumping from file to file, from class to class, I just look at the graphs. While graph building has been an important reason for me to code such a tool, /smalisca/ has some other neat *features* you should read about. [ DOWNLOAD ] http://www.nullsecurity.net/tools/scanner.html Also, available here: https://pypi.python.org/pypi/smalisca [ NOTES ] - first release - open pull requests for bug reports / whatever on: https://github.com/nullsecuritynet/tools/tree/master/scanner/smalisca or send direct email to cyneox[at]nullsecurity.net Cheers, noptrix -- Name: Levon 'noptrix' Kayan E-Mail: noptrix@...lsecurity.net GPG key: 0xDCA45D42 Key fingerprint: 250A 573C CA93 01B3 7A34 7860 4D48 E33A DCA4 5D42 Homepage: http://www.nullsecurity.net/ _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists