AWAKE

Android Wiki of Attacks, Knowledge & Exploits
How malware works, how attacks exploit the platform, how protections are broken. Built for analysts, reversers, pentesters, and threat intelligence researchers. Everything is offense-first.

Where to Start

Malware Analyst

Start with the family catalog. The timeline gives historical context, and naming conventions helps map between vendor detection names. When a sample is packed, use the packer decision tree.

Reverse Engineer

Start with packer identification. For runtime work, hooking and patching cover the major approaches. The frameworks section documents each development framework's analysis workflow.

Pentester

Start with attack techniques -- organized by attack surface with a combination matrix. The permissions section documents what each permission unlocks and how escalation works in practice.

Threat Intelligence

Start with threat actors for MaaS operator attribution. The timeline tracks evolution from 2010 to present. Grayware covers the ecosystem between monetization and malware.