Version: v.13 (13)
armeabi + armeabi-v7a + x86
Package: com.nowsecure.android.vts
8,166 downloads
2.24 MB (2,350,365 bytes)
Min: Android 4.0.3 (Ice Cream Sandwich MR1, API 15)
Target: Android 6.0 (Marshmallow, API 23)
nodpi
Uploaded December 15, 2015 at 11:31PM UTC by Displax

Download APK
2.24 MB
APK Notes:

1. Prioritize vulnerables which were positive on the device.
2. Add intro/welcome screens.
3. Add a test for CVE-2015-6616 from the December sec bulletin.

1. Prioritize vulnerables which were positive on the device.
2. Add intro/welcome screens.
3. Add a test for CVE-2015-6616 from the December sec bulletin.

This release does not have a Play Store Description, so we grabbed one from version v.12:

This tool probes your device for publicly-known system vulnerabilities. All data will stay on your device and will not be shared without your explicit consent. If the app says you're affected, please read https://www.nowsecure.com/blog/2015/11/18/my-device-is-vulnerable-now-what/. This application is not malicious, and because it’s an open-source project you can see this for yourself on the app’s Github repo https://github.com/nowsecure/android-vts.

Please file any bugs, issues, or feature requests at: https://github.com/nowsecure/android-vts/issues. Note that some anti-virus programs may flag this application because it probes the device for weaknesses.

This tool is meant to show the end user the attack surface that a given device is susceptible to. In implementing these checks we attempt to minimize or eliminate both false positives/false negatives without negatively affecting system stability. The application is open source and you can contribute or review the source code at https://github.com/nowsecure/android-vts.

When a vulnerability is discovered, Google receives word and applies a patch to Android. The Nexus devices are usually the devices that receive these patches quickest as they deviate the least (read: not all) from AOSP (Android Open Source Project - The core of Android, where Google commits to). The lag time between learning about a bug and the time when a patch is applied to a device can still be significant (for OEMs, it can be > 1 year or never). For example, the futex bug (CVE-2014-3153/Towelroot) was known about in late May, early June. This bug took multiple months to get patched on the flagship (at the time) Nexus 5. This leaves users extremely vulnerable to attack from applications. Users mostly do not know that their devices are vulnerable and this tool is meant to give visibility into the vulnerabilities a given device is susceptible to.

This release may come in several variants. Consult our handy FAQ to see which download is right for you.

Variant
Arch
Version
DPI
v.13 APK
13
December 15, 2015
universal
Android 4.0.3+
nodpi
Previous APKs for (universal) variant
VTS for Android v.13 APK
December 15, 2015

Version:v.13(13) for Android 4.0.3+ (Ice Cream Sandwich MR1, API 15)

Uploaded:December 15, 2015 at 11:31PM UTC

File size:2.24 MB

Downloads:8,166

VTS for Android v.12 APK
December 3, 2015

Version:v.12(12) for Android 4.0.3+ (Ice Cream Sandwich MR1, API 15)

Uploaded:December 3, 2015 at 10:22PM UTC

File size:2.02 MB

Downloads:136

All versions
December 15, 2015

Version:v.13

Uploaded:December 15, 2015 at 11:31PM UTC

File size:2.24 MB

Downloads:8,166

December 3, 2015

Version:v.12

Uploaded:December 3, 2015 at 10:22PM UTC

File size:2.02 MB

Downloads:136

November 21, 2015

Version:v.9

Uploaded:November 21, 2015 at 12:51AM UTC

File size:5.01 MB

Downloads:1,163

Comments