AI Generated Content Disclaimer
Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.
This presentation is the BlackHat USA 2016 Arsenal demo of Android Tamer, an expanded showcase of the project that has evolved from a single virtual machine into a comprehensive ecosystem for Android security professionals. Android Tamer now encompasses a VM, a Debian 8-compatible tools repository, custom emulator support (work in progress), an F-Droid repository for on-device tools, documentation, and a knowledge base β all fully open source. The demo covers the full tool suite, custom features, the repository system, and multiple live demonstrations of key capabilities.
Android Tamer Ecosystem: Beyond just a virtual machine, Android Tamer has grown into a multi-component platform:
apt-gettools.androidtamer.com with evolving tool documentationkb.androidtamer.com (work in progress)Target Audience: The platform serves trainers who need reproducible lab environments, security professionals conducting Android assessments, developers building and testing Android applications, and IoT hackers working with Android-based embedded systems.
Fully Open Source: All components are open source on GitHub under the AndroidTamer organization:
AndroidTamer/VagrantBuild)AndroidTamer/Packaging_Tools)AndroidTamer/Tools)Expanded Tool Suite: The BH USA 2016 edition includes additional tools over the Asia version:
Custom Features: One-liner commands (apk2java, drozer_start), easy multi-device management, automated analysis scripts, apt-get managed updates, all tools in PATH, and ZSH with autosuggestion for improved shell productivity.
Live Demonstrations:
~/.adb_list with "NAME;SERIALNO" format entriesSecurity Enhancements Tracking: The knowledge base at kb.androidtamer.com/android_security_enhancement/ documents Android security enhancements across versions, serving as a reference for understanding platform-level security changes.
How to Contribute: The project welcomes contributions through testing tools and suggesting improvements, writing about and promoting the project, adding new tools via the packaging build scripts, reporting and tracking issues on GitHub, and testing the repository on other distributions (Kali, Ubuntu, and other pentest distros).
repo.androidtamer.com) standalone on existing Debian-based systems like Kali Linux to get Android security tools without needing the full VM, enabling integration into your existing workflow.Droid-FF fuzzing framework included in this edition for discovering vulnerabilities beyond what static and dynamic analysis tools find in Android applications and the platform itself.AndroidTamer/Packaging_Tools, expanding the ecosystem for the entire community.