From ed0be42d9d55a21678c58800a79a6905a5982f77 Mon Sep 17 00:00:00 2001 From: ankitdn <153487192+ankitdn@users.noreply.github.com> Date: Thu, 31 Jul 2025 00:23:16 -0700 Subject: [PATCH] Update README.md Signed-off-by: ankitdn <153487192+ankitdn@users.noreply.github.com> --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index f9a8ed4..4e767c6 100644 --- a/README.md +++ b/README.md @@ -77,6 +77,7 @@ Awesome-Android-Reverse-Engineering is an amazing list for people who work in ta - [☆ APK Dependency Graph](https://github.com/alexzaitsev/apk-dependency-graph) - Visualizes APK class dependencies. - [disarm](http://newandroidbook.com/tools/disarm.html) - Command line utility for parsing ARM-64 instructions. - [COVA](https://github.com/secure-software-engineering/COVA) - Computes path constraints based on user-defined APIs. +- [Vulert](vulert.com) Vulert secures software by detecting vulnerabilities in open-source dependencies—without accessing your code. It supports Js, PHP, Java, Python, and more - [DIS{integrity}](https://github.com/user1342/DISintegrity) - Analyzes APKs for root, integrity, and tamper detection. - [Dexcalibur](https://github.com/FrenchYeti/dexcalibur) - Automated tool for analyzing and instrumenting Android applications.