16 |
17 | The first tool, named Alan, through a simple UI, provides the application of eight different smali code transformations
18 | (detailed informations about these transformations can be found into the paper attached with the project).
19 | This tool contains other two free tools (signapk, apktool) used to decompile and recompile an android
20 | application, providing almost original resources of the application.
21 | The tool works on smali code, a human readable dalvik bytecode.
22 | The aim of these transformations is hiding a malicious behaviour of an application from static malware scanning techniques.
23 | A transformed application can be submitted on the website VirusTotal where it can be analyzed by 57 well-known (free and paid) anti-malwares.
24 |
25 | In order to work on a large malaware data-set, we developed a second tool, composed basically of code
26 | enabling an automatic upload of the android applications on virus-total, using his specific java API, storing
27 | result analysis on a relational database (we provide the schema in the project).
28 | This tool provides a simple UI to select among several queries, presenting results on html files
29 | Everything is well-documented and ready to be improved for future works.
30 |
31 | If you are interested in the results of the study we've carried out analyzing how 57 antimalwares
32 | from VirusTotal perform against 5600 malwares, before and after the application of obfuscating transformations, you can contact us.
33 |
34 |
35 |
--------------------------------------------------------------------------------
/framework sources/Alan/.classpath:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
--------------------------------------------------------------------------------
/framework sources/Alan/.project:
--------------------------------------------------------------------------------
1 |
2 |
3 | TransformationEngine3
4 |
5 |
6 |
7 |
8 |
9 | org.eclipse.jdt.core.javabuilder
10 |
11 |
12 |
13 |
14 |
15 | org.eclipse.jdt.core.javanature
16 |
17 |
18 |
--------------------------------------------------------------------------------
/framework sources/Alan/apktool/AndroidManifest.xml:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/apktool/AndroidManifest.xml
--------------------------------------------------------------------------------
/framework sources/Alan/apktool/aapt.exe:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/apktool/aapt.exe
--------------------------------------------------------------------------------
/framework sources/Alan/apktool/apktool.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 | set PATH=%CD%;%PATH%;
3 | java -jar "%~dp0\apktool.jar" %1 %2 %3 %4 %5 %6 %7 %8 %9
4 |
--------------------------------------------------------------------------------
/framework sources/Alan/apktool/apktool.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/apktool/apktool.jar
--------------------------------------------------------------------------------
/framework sources/Alan/bin/GestoreCheckBoxPackageName.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/bin/GestoreCheckBoxPackageName.class
--------------------------------------------------------------------------------
/framework sources/Alan/bin/GestoreFrame.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/bin/GestoreFrame.class
--------------------------------------------------------------------------------
/framework sources/Alan/bin/GestorePackageName.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/bin/GestorePackageName.class
--------------------------------------------------------------------------------
/framework sources/Alan/bin/GestorePulsanteAddApk.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/bin/GestorePulsanteAddApk.class
--------------------------------------------------------------------------------
/framework sources/Alan/bin/GestorePulsanteStart.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/bin/GestorePulsanteStart.class
--------------------------------------------------------------------------------
/framework sources/Alan/bin/InterfaceEngine.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/bin/InterfaceEngine.class
--------------------------------------------------------------------------------
/framework sources/Alan/bin/Main.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/bin/Main.class
--------------------------------------------------------------------------------
/framework sources/Alan/bin/ThreadPulsanteStart.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/bin/ThreadPulsanteStart.class
--------------------------------------------------------------------------------
/framework sources/Alan/callIndirection.bat:
--------------------------------------------------------------------------------
1 | echo START CALL INDIRECTION...
2 | cd callIndirection
3 | call java -jar callIndirection.jar ..\%1\smali
4 | cd..
5 | echo END CALL INDIRECTION
6 |
--------------------------------------------------------------------------------
/framework sources/Alan/callIndirection/callIndirection.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/callIndirection/callIndirection.jar
--------------------------------------------------------------------------------
/framework sources/Alan/changingPackage.bat:
--------------------------------------------------------------------------------
1 | echo START CHANGING PACKAGE NAME...
2 | cd changingPackage
3 | call java -jar changingPackage.jar ..\%1\AndroidManifest.xml %2 ..\%1
4 | cd..
5 | echo END CHANGING PACKAGE NAME
6 |
--------------------------------------------------------------------------------
/framework sources/Alan/changingPackage/changingPackage.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/changingPackage/changingPackage.jar
--------------------------------------------------------------------------------
/framework sources/Alan/codeReordering.bat:
--------------------------------------------------------------------------------
1 | echo START CODE REORDERING...
2 | cd codeReordering
3 | call java -jar codeReorder.jar ..\%1\smali
4 | cd..
5 | echo END CODE REORDERING.
6 |
--------------------------------------------------------------------------------
/framework sources/Alan/codeReordering/codeReorder.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/codeReordering/codeReorder.jar
--------------------------------------------------------------------------------
/framework sources/Alan/dalvikobfuscator/.gitignore:
--------------------------------------------------------------------------------
1 | *.py[co]
2 |
3 | # Packages
4 | *.egg
5 | *.egg-info
6 | dist
7 | build
8 | eggs
9 | parts
10 | bin
11 | var
12 | sdist
13 | develop-eggs
14 | .installed.cfg
15 |
16 | # Installer logs
17 | pip-log.txt
18 |
19 | # Unit test / coverage reports
20 | .coverage
21 | .tox
22 |
23 | #Translations
24 | *.mo
25 |
26 | #Mr Developer
27 | .mr.developer.cfg
28 |
--------------------------------------------------------------------------------
/framework sources/Alan/dalvikobfuscator/README.md:
--------------------------------------------------------------------------------
1 | dalvik-obfuscator
2 | =================
3 |
4 | a set of tools/scripts to obfuscate and manipulate dex files
5 |
6 | This toolset has been used to create an Android Proof-of-Concept crackme.
7 | It has also been used to create test APK files in order
8 | to evaluate this obfuscation technique against common
9 | reverse engineering tools for Android.
10 |
11 | Further information about this obfuscation technique can be found under:
12 | http://www.dexlabs.org/blog/bytecode-obfuscation
13 |
14 | WARNING:
15 | Don't apply this technique to your applications. It can break your app.
16 | It is for research only!
--------------------------------------------------------------------------------
/framework sources/Alan/dalvikobfuscator/baksmali-modifier.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # Copyright (C) 2012 pleed@dexlabs.org
3 | #
4 | # Licensed under the Apache License, Version 2.0 (the 'License');
5 | # you may not use this file except in compliance with the License.
6 | # You may obtain a copy of the License at
7 | #
8 | # http://www.apache.org/licenses/LICENSE-2.0
9 | #
10 | # Unless required by applicable law or agreed to in writing, software
11 | # distributed under the License is distributed on an 'AS IS' BASIS,
12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 | # See the License for the specific language governing permissions and
14 | # limitations under the License.
15 |
16 |
17 | import sys
18 | import os
19 |
20 | from pyparsing import *
21 |
22 | InjectedCode = ["nop\n" for i in range(10)]
23 | MethodToken = Literal(".method")
24 | AccessFlag = Literal("public") | \
25 | Literal("private") | \
26 | Literal("protected")| \
27 | Literal("abstract")| \
28 | Literal("static")| \
29 | Literal("constructor")| \
30 | Literal("final")| \
31 | Literal("native") | \
32 | Literal("bridge") | \
33 | Literal("synthetic") | \
34 | Literal("native") | \
35 | Literal("varargs") | \
36 | Literal("declared-synchronized")
37 |
38 | JavaType = Word(alphas+"[", alphanums +"_$[;/", min=1)
39 | MethodName = Word(alphas+"$_<", alphanums+"_>$", min=1)
40 | ArgList = JavaType
41 | MethodProtoType = MethodName + Suppress("(") + Optional(ArgList) + Suppress(")") + JavaType
42 | MethodDecl = Suppress(MethodToken) + ZeroOrMore(AccessFlag) + Suppress(MethodProtoType)
43 |
44 | def injectnops(filename):
45 | with open(filename, "r") as smalifile:
46 | lines = smalifile.readlines()
47 | modified = []
48 | for index, line in enumerate(lines):
49 | modified.append(line)
50 | if line.startswith(".method"):
51 | try:
52 | flags = list(MethodDecl.parseString(line.strip("\n"),parseAll=True))
53 | except Exception as e:
54 | print line
55 | raise e
56 | if "abstract" not in flags and "native" not in flags:
57 | modified += InjectedCode
58 |
59 | with open(filename, "w") as smalifile:
60 | smalifile.writelines(modified)
61 |
62 | def run(directory):
63 | for dirpath, dinames, filenames in os.walk(directory):
64 | for filename in filter(lambda x: x.endswith(".smali"), filenames):
65 | injectnops(os.path.join(dirpath, filename))
66 |
67 | def usage():
68 | print "%s %s"%(sys.argv[0], sys.argv[1])
69 | print ""
70 | print "inject nops into baksmali files"
71 |
72 | if __name__ == "__main__":
73 | if len(sys.argv) != 2:
74 | usage()
75 | else:
76 | run(sys.argv[1])
77 |
78 |
79 |
--------------------------------------------------------------------------------
/framework sources/Alan/dalvikobfuscator/nopToJunk1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/dalvikobfuscator/nopToJunk1.jar
--------------------------------------------------------------------------------
/framework sources/Alan/dalvikobfuscator/nopToJunk2.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/dalvikobfuscator/nopToJunk2.jar
--------------------------------------------------------------------------------
/framework sources/Alan/dalvikobfuscator/obfuscate.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | # Copyright (C) 2012 thuxnder@dexlabs.org
3 | #
4 | # Licensed under the Apache License, Version 2.0 (the 'License');
5 | # you may not use this file except in compliance with the License.
6 | # You may obtain a copy of the License at
7 | #
8 | # http://www.apache.org/licenses/LICENSE-2.0
9 | #
10 | # Unless required by applicable law or agreed to in writing, software
11 | # distributed under the License is distributed on an 'AS IS' BASIS,
12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 | # See the License for the specific language governing permissions and
14 | # limitations under the License.
15 |
16 |
17 | pw=NULL
18 |
19 | echo "unpacking" &&
20 | java -jar tools/apktool/apktool.jar d $1 out > /dev/null 2>&1 &&
21 | echo "injecting nop sled" &&
22 | python baksmali-modifier.py out/smali > /dev/null &&
23 | echo "repacking" &&
24 | java -jar tools/apktool/apktool.jar b out new.apk > /dev/null 2>&1 &&
25 | echo "extract classes.dex" &&
26 | unzip new.apk classes.dex > /dev/null &&
27 | echo "add obfuscation" &&
28 | python injector.py classes.dex > /dev/null &&
29 | echo "add classes.dex" &&
30 | aapt r new.apk classes.dex > /dev/null &&
31 | aapt a new.apk classes.dex > /dev/null &&
32 | #echo "signing" &&
33 | #echo $pw | jarsigner -verbose -sigalg MD5withRSA -digestalg SHA1 -keystore keystore new.apk KEYNAME > /dev/null 2>&1 ;
34 | rm classes.dex &&
35 | rm -r out &&
36 | echo "done"
37 |
38 |
39 |
--------------------------------------------------------------------------------
/framework sources/Alan/dalvikobfuscator/readme1.txt:
--------------------------------------------------------------------------------
1 | -JUNK INSTRUCTION
2 |
3 | -questo script inserisce delle "nop" all'interno di tutti i file .smali della directori indicata in input
4 |
5 | python baksmali-modifier.p "path della directory smali"
6 |
7 |
--------------------------------------------------------------------------------
/framework sources/Alan/dalvikobfuscator/readme2.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/dalvikobfuscator/readme2.txt
--------------------------------------------------------------------------------
/framework sources/Alan/dataEncoding.bat:
--------------------------------------------------------------------------------
1 | echo START DATA ENCODING...
2 | cd dataEncoding
3 | call java -jar encrypter.jar ..\%1\smali
4 | mkdir ..\%1\smali\com12345689
5 | copy Decrypter.smali ..\%1\smali\com12345689
6 | cd..
7 | echo END DATA ENCODING.
8 |
--------------------------------------------------------------------------------
/framework sources/Alan/dataEncoding/Decrypter.smali:
--------------------------------------------------------------------------------
1 | .class public Lcom123456789/Decrypter;
2 | .super Ljava/lang/Object;
3 | .source "Decrypter.java"
4 |
5 |
6 | # direct methods
7 | .method public constructor ()V
8 | .locals 0
9 |
10 | .prologue
11 | .line 6
12 | invoke-direct {p0}, Ljava/lang/Object;->()V
13 |
14 | return-void
15 | .end method
16 |
17 | .method public static applyCaesar(Ljava/lang/String;)Ljava/lang/String;
18 | .locals 8
19 | .param p0, "text" # Ljava/lang/String;
20 |
21 | .prologue
22 | const/16 v7, 0x20
23 |
24 | .line 10
25 | const/4 v3, -0x2
26 |
27 | .line 11
28 | .local v3, "shift":I
29 | invoke-virtual {p0}, Ljava/lang/String;->toCharArray()[C
30 |
31 | move-result-object v1
32 |
33 | .line 12
34 | .local v1, "chars":[C
35 | const/4 v4, 0x0
36 |
37 | .line 13
38 | .local v4, "skip":Z
39 | const/4 v2, 0x0
40 |
41 | .local v2, "i":I
42 | :goto_0
43 | invoke-virtual {p0}, Ljava/lang/String;->length()I
44 |
45 | move-result v6
46 |
47 | if-lt v2, v6, :cond_0
48 |
49 | .line 53
50 | new-instance v6, Ljava/lang/String;
51 |
52 | invoke-direct {v6, v1}, Ljava/lang/String;->([C)V
53 |
54 | return-object v6
55 |
56 | .line 15
57 | :cond_0
58 | aget-char v0, v1, v2
59 |
60 | .line 16
61 | .local v0, "c":C
62 | const/16 v6, 0x5c
63 |
64 | if-ne v0, v6, :cond_2
65 |
66 | .line 18
67 | const/4 v4, 0x1
68 |
69 | .line 13
70 | :cond_1
71 | :goto_1
72 | add-int/lit8 v2, v2, 0x1
73 |
74 | goto :goto_0
75 |
76 | .line 21
77 | :cond_2
78 | const/16 v6, 0x22
79 |
80 | if-eq v0, v6, :cond_1
81 |
82 | .line 23
83 | if-eq v0, v7, :cond_1
84 |
85 | .line 25
86 | const/16 v6, 0xa
87 |
88 | if-eq v0, v6, :cond_1
89 |
90 | .line 27
91 | const/16 v6, 0x9
92 |
93 | if-eq v0, v6, :cond_1
94 |
95 | .line 29
96 | const/16 v6, 0x27
97 |
98 | if-eq v0, v6, :cond_1
99 |
100 | .line 31
101 | const/16 v6, 0x5a
102 |
103 | if-eq v0, v6, :cond_1
104 |
105 | .line 35
106 | if-lt v0, v7, :cond_1
107 |
108 | const/16 v6, 0x7f
109 |
110 | if-gt v0, v6, :cond_1
111 |
112 | .line 38
113 | if-eq v0, v7, :cond_3
114 |
115 | if-nez v4, :cond_1
116 |
117 | .line 43
118 | :cond_3
119 | const/4 v4, 0x0
120 |
121 | .line 46
122 | add-int/lit8 v5, v0, -0x20
123 |
124 | .line 47
125 | .local v5, "x":I
126 | add-int v6, v5, v3
127 |
128 | rem-int/lit8 v5, v6, 0x60
129 |
130 | .line 48
131 | if-gez v5, :cond_4
132 |
133 | .line 49
134 | add-int/lit8 v5, v5, 0x60
135 |
136 | .line 50
137 | :cond_4
138 | add-int/lit8 v6, v5, 0x20
139 |
140 | int-to-char v6, v6
141 |
142 | aput-char v6, v1, v2
143 |
144 | goto :goto_1
145 | .end method
146 |
--------------------------------------------------------------------------------
/framework sources/Alan/dataEncoding/encrypter.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/dataEncoding/encrypter.jar
--------------------------------------------------------------------------------
/framework sources/Alan/disass.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 | echo START DISASSEMBLING...
3 | call apktool\apktool d %1
4 | echo END DISASSEMBLING.
5 |
--------------------------------------------------------------------------------
/framework sources/Alan/icon.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/icon.png
--------------------------------------------------------------------------------
/framework sources/Alan/identifierRenaming.bat:
--------------------------------------------------------------------------------
1 | echo START IDENTIFIER RENAMING...
2 | cd identifierRenaming
3 | call java -jar identifierRenaming.jar ..\%1\AndroidManifest.xml ..\%1 %2
4 | cd..
5 | echo END IDENTIFIER RENAMIN
6 |
--------------------------------------------------------------------------------
/framework sources/Alan/identifierRenaming/identifierRenaming.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/identifierRenaming/identifierRenaming.jar
--------------------------------------------------------------------------------
/framework sources/Alan/insjunk.bat:
--------------------------------------------------------------------------------
1 | cd dalvikobfuscator
2 | if %2==nop (
3 | echo START INSERT JUNK INSTRUCTIONS NOP...
4 | python baksmali-modifier.py ..\%1\smali
5 | echo END INSERT JUNK INSTRUCTIONS NOP
6 | )
7 | if %2==branch (
8 | echo START INSERT JUNK INSTRUCTION BRANCH...
9 | python baksmali-modifier.py ..\%1\smali
10 | call java -jar nopToJunk1.jar ..\%1\smali
11 | echo END INSERT JUNK INSTRUCTION BRANCH
12 | )
13 | if %2==garbage (
14 | echo START INSERT JUNK INSTRUCTION GARBAGE...
15 | call java -jar nopToJunk2.jar ..\%1\smali
16 | echo END INSERT JUNK INSTRUCTION GARBAGE
17 | )
18 | if %2==nop-garbage (
19 | echo START INSERT JUNK INSTRUCTION NOP-GARBAGE...
20 | python baksmali-modifier.py ..\%1\smali
21 | call java -jar nopToJunk2.jar ..\%1\smali
22 | echo END INSERT JUNK INSTRUCTION NOP-GARBAGE
23 | )
24 | if %2==branch-garbage (
25 | echo START INSERT JUNK INSTRUCTION BRANCH-GARBAGE...
26 | python baksmali-modifier.py ..\%1\smali
27 | call java -jar nopToJunk1.jar ..\%1\smali
28 | call java -jar nopToJunk2.jar ..\%1\smali
29 | echo END INSERT JUNK INSTRUCTION BRANCH-GARBAGE
30 | )
31 | cd..
32 |
--------------------------------------------------------------------------------
/framework sources/Alan/lib/NOTICE.txt:
--------------------------------------------------------------------------------
1 | Apache Commons IO
2 | Copyright 2002-2012 The Apache Software Foundation
3 |
4 | This product includes software developed by
5 | The Apache Software Foundation (http://www.apache.org/).
6 |
7 |
--------------------------------------------------------------------------------
/framework sources/Alan/lib/RELEASE-NOTES.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/lib/RELEASE-NOTES.txt
--------------------------------------------------------------------------------
/framework sources/Alan/lib/commons-io-2.4-javadoc.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/lib/commons-io-2.4-javadoc.jar
--------------------------------------------------------------------------------
/framework sources/Alan/lib/commons-io-2.4-sources.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/lib/commons-io-2.4-sources.jar
--------------------------------------------------------------------------------
/framework sources/Alan/lib/commons-io-2.4-test-sources.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/lib/commons-io-2.4-test-sources.jar
--------------------------------------------------------------------------------
/framework sources/Alan/lib/commons-io-2.4-tests.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/lib/commons-io-2.4-tests.jar
--------------------------------------------------------------------------------
/framework sources/Alan/lib/commons-io-2.4.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/faber03/AndroidMalwareEvaluatingTools/58324b84ebf8843e909e1243bbd2d1725a28b884/framework sources/Alan/lib/commons-io-2.4.jar
--------------------------------------------------------------------------------
/framework sources/Alan/lib/docs/index.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | Commons IO 2.4 API
9 |
10 |
21 |
23 |
24 |
40 |
41 |
--------------------------------------------------------------------------------
/framework sources/Alan/lib/docs/org/apache/commons/io/comparator/package-frame.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | org.apache.commons.io.comparator (Commons IO 2.4 API)
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 | org.apache.commons.io.comparator
21 |
35 | This document is designed to be viewed using the frames feature. If you see this message, you are using a non-frame-capable web client.
36 |
37 | Link toNon-frame version.
38 |