From 89aed9bdb1aac6b8b0ad10d41f8e606928962167 Mon Sep 17 00:00:00 2001 From: Ashish Bhatia Date: Wed, 8 Jan 2025 22:14:19 -0800 Subject: [PATCH] chore(tms-api-server): mark more links as dead --- README.md | 3 +-- run_awesome_bot.sh | 3 ++- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 4b8e9fb..e5c3613 100644 --- a/README.md +++ b/README.md @@ -62,7 +62,6 @@ A collection of Android security-related resources. 1. [SmaliSCA](https://github.com/dorneanu/smalisca) - Smali Static Code Analysis 1. [CFGScanDroid](https://github.com/douggard/CFGScanDroid) - Scans and compares CFG against CFG of malicious applications 1. [Madrolyzer](https://github.com/maldroid/maldrolyzer) - extracts actionable data like C&C, phone number etc. -1. [SPARTA](https://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](https://types.cs.washington.edu/checker-framework/) 1. [ConDroid](https://github.com/JulianSchuette/ConDroid) - Performs a combination of symbolic + concrete execution of the app 1. [DroidRA](https://github.com/serval-snt-uni-lu/DroidRA) 1. [RiskInDroid](https://github.com/ClaudiuGeorgiu/RiskInDroid) - A tool for calculating the risk of Android apps based on their permissions, with an online demo available. @@ -76,6 +75,7 @@ A collection of Android security-related resources. 1. [Mobile Audit](https://github.com/mpast/mobileAudit) - Web application for performing Static Analysis and detecting malware in Android APKs. 1. ~~[Smali CFG generator](https://github.com/EugenioDelfa/Smali-CFGs)~~ 1. ~~[Several tools from PSU](http://siis.cse.psu.edu/tools.html)~~ +1. ~~[SPARTA](https://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](https://types.cs.washington.edu/checker-framework/)~~ ### App Vulnerability Scanners @@ -246,7 +246,6 @@ A collection of Android security-related resources. 1. [Android Security Bulletins](https://source.android.com/security/bulletin/) 1. [Android's reported security vulnerabilities](https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/Google-Android.html) -1. [AOSP - Issue tracker](https://code.google.com/p/android/issues/list?can=2&q=priority=Critical&sort=-opened) 1. [OWASP Mobile Top 10 2016](https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10) 1. [Exploit Database](https://www.exploit-db.com/search/?action=search&q=android) - click search 1. [Vulnerability Google Doc](https://docs.google.com/spreadsheet/pub?key=0Am5hHW4ATym7dGhFU1A4X2lqbUJtRm1QSWNRc3E0UlE&single=true&gid=0&output=html) diff --git a/run_awesome_bot.sh b/run_awesome_bot.sh index 71728af..da237b3 100755 --- a/run_awesome_bot.sh +++ b/run_awesome_bot.sh @@ -36,7 +36,8 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/', 'https://approver.talos-sec.com',\ 'https://wiki.sei.cmu.edu/confluence/display/android/Android+Secure+Coding+Standard',\ 'https://web.archive.org/web/20180721134044/http://www.fasteque.com:80/android-reverse-engineering-101-part-1/',\ -'https://manifestsecurity.com/appie/' +'https://manifestsecurity.com/appie/',\ +'https://www.cs.washington.edu/sparta' FLAKY_URLS='http://safe.ijiami.cn/',\ 'https://apkcombo.com/apk-downloader/',\