Thursday 3 November 2011

Android Reverse Engineering ( A.R.E ) Virtual Machine


The Android Reverse Engineering (A.R.E.) Virtual Machine, put together by Anthony Desnos from our French chapter, is here to help. A.R.E. combines the latest Android malware analysis tools in a readily accessible toolbox.


Tools - 
                                     http://www.honeynet.org/downloads/Android.tar.gz
                                     http://itsec.rwth-aachen.de/files/honeynetproject_are.tar.gz
                                     http://www.honeynor.no/data/honeynetproject_are.tar.gz

The login is : android
And the password is : android


No comments:

Post a Comment