Awesome-Android-Reverse-Engineering
A curated list of awesome Android Reverse Engineering training, resources, and tools. (by user1342)
awesome-devsecops
Curating the best DevSecOps resources and tooling. (by TaptuIT)
Awesome-Android-Reverse-Engineering | awesome-devsecops | |
---|---|---|
3 | 2 | |
540 | 1,267 | |
- | 2.9% | |
4.3 | 5.1 | |
about 1 month ago | 6 days ago | |
MIT License | Creative Commons Zero v1.0 Universal |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Awesome-Android-Reverse-Engineering
Posts with mentions or reviews of Awesome-Android-Reverse-Engineering.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-04-09.
awesome-devsecops
Posts with mentions or reviews of awesome-devsecops.
We have used some of these posts to build our list of alternatives
and similar projects.
What are some alternatives?
When comparing Awesome-Android-Reverse-Engineering and awesome-devsecops you can also consider the following projects:
Windows - Awesome tools to exploit Windows !
awesome-threat-modelling - A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.