Reza-saeedi / Malware-Detection-ToolsView external linksLinks
A list of awesome malware detection tools
☆85Jul 8, 2022Updated 3 years ago
Alternatives and similar repositories for Malware-Detection-Tools
Users that are interested in Malware-Detection-Tools are comparing it to the libraries listed below
Sorting:
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- A Deep Learning Model for detecting Malware Applications☆14Aug 3, 2025Updated 6 months ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆14Mar 22, 2022Updated 3 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Android Malware Detection with Graph Convolutional Networks using Function Call Graph and its Derivatives.☆40Aug 2, 2021Updated 4 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- mobile reverse engineering framework☆92Updated this week
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Jun 23, 2016Updated 9 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 4 years ago
- 使用tcpdump 和wireshark进行Android(root过后)设备的实时抓包☆12Feb 7, 2017Updated 9 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Oct 8, 2024Updated last year
- A machine learning based Android malware detection model.☆14Apr 13, 2017Updated 8 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- Sources code extracted from malwares for analysis☆41Mar 10, 2023Updated 2 years ago
- generate yara-androguard report on your local and scan☆12Oct 3, 2019Updated 6 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- It's a malware detection API for Windows malware utilizing Artificial Neural network.☆19Aug 2, 2024Updated last year
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- Deep Learning Based Android Malware Detection Framework☆40Oct 4, 2020Updated 5 years ago
- Docker container to use blutter (dart decompiler for android apps)☆22Sep 18, 2024Updated last year
- A framework for automated extraction of static and dynamic features from Android applications☆379Dec 7, 2022Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 2 years ago
- A repo that contains a recursive dump from the ROOT key of every Windows Registry hive (using KAPE) from a vanilla (clean) install of eve…☆54Oct 29, 2025Updated 3 months ago
- vim, xmonad, xmobar, bashrc, bash profile and inits☆18Apr 7, 2023Updated 2 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Jun 21, 2022Updated 3 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆93Apr 14, 2024Updated last year
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Jan 4, 2019Updated 7 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Jan 2, 2022Updated 4 years ago
- Research tools for analysing Cerberus banking trojan.☆131Mar 9, 2022Updated 3 years ago
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.☆30May 23, 2025Updated 8 months ago