This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malware
☆30Jun 29, 2024Updated last year
Alternatives and similar repositories for REcon2024
Users that are interested in REcon2024 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆13May 31, 2023Updated 2 years ago
- This contains notes, slides, and code for my Infosec World talk☆18Sep 26, 2023Updated 2 years ago
- This contains notes, slides, and code for my BsidesSeattle 2023 talk, Unmasking the Godfather☆12May 25, 2023Updated 2 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆24Jun 30, 2023Updated 2 years ago
- This contains notes, slides, and code for my Strange Loop talk☆31Sep 22, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Supporting code and apps for demonstrating Android interprocess communication☆43Aug 5, 2024Updated last year
- ☆20Aug 12, 2023Updated 2 years ago
- Smali reference for reverse engineering Dalvik Bytecode☆41Sep 6, 2023Updated 2 years ago
- Turn binaries into music☆65May 17, 2024Updated last year
- Run the Medusa Android framework inside a docker container on x86 or ARM☆41Mar 19, 2023Updated 3 years ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆66Feb 6, 2026Updated last month
- Automated Android custom unpacker generator☆376Aug 23, 2025Updated 7 months ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆124Feb 7, 2023Updated 3 years ago
- Notes and slides for my 2024 Objective by the Sea talk on iOS decompilation☆36Dec 17, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This contains notes and slides for my Objective by the Sea talk☆98Oct 14, 2023Updated 2 years ago
- Docker container for quickly analyzing Linux malware☆86Aug 20, 2023Updated 2 years ago
- This code is gross, don't look at it☆31Jan 12, 2026Updated 2 months ago
- The iOS IPA file Reverse Engineering reference☆509Jan 29, 2024Updated 2 years ago
- Supporting code for exploiting the RISC-V GhostWrite vulnerability☆85Nov 22, 2024Updated last year
- ☆113Oct 1, 2024Updated last year
- Repository of algorithms implemented in pure assembly☆289Jun 12, 2024Updated last year
- JADX-gui scripting plugin for dynamic decompiler manipulation☆725Feb 5, 2024Updated 2 years ago
- 🔓A Curated List Of Modern Android Exploitation Conference Talks.☆715Mar 20, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Fast(er) AES-based constructions for WebAssembly and Rust.☆24Apr 27, 2025Updated 11 months ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆31Sep 18, 2023Updated 2 years ago
- My talks and papers☆41Nov 24, 2025Updated 4 months ago
- A simple distributed document database backed by Sled Key/Value store☆30Oct 14, 2021Updated 4 years ago
- It's me!! So cute!!!☆15Mar 13, 2026Updated 2 weeks ago
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- 一个基于JSRPC实现的自动解密代理框架☆13Sep 28, 2023Updated 2 years ago
- DEFCON 30 Car Hacking Village Presentation☆11Sep 11, 2022Updated 3 years ago
- ☆23Mar 15, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A pure Rust implementation of AES 128☆18Mar 24, 2020Updated 6 years ago
- Archive for acez.re blog.☆21Apr 17, 2023Updated 2 years ago
- An Experimental Rust Crate for Post-Quantum Code-Signing Certificates.☆26Dec 11, 2021Updated 4 years ago
- Documentation for Vilo router vulnerability research☆15Oct 21, 2024Updated last year
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 4 months ago
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆13Jan 31, 2024Updated 2 years ago
- AN EXPERIMENTAL INDIE 1D ROGUELIKE. YOU ARE DEAD☆73Apr 2, 2013Updated 12 years ago