Extract, gather and analyze information from an Android Manifest file or an APK.
☆19Jun 9, 2023Updated 2 years ago
Alternatives and similar repositories for AMAnDe
Users that are interested in AMAnDe are comparing it to the libraries listed below
Sorting:
- ☆27May 6, 2024Updated last year
- Ansible/Packer/Terraform setup for our Bambi CTF on Hetzner Cloud☆20Sep 10, 2025Updated 6 months ago
- BinjaryNinja plugin for a ShellStorm like assembly/disassembly experience☆17Nov 28, 2024Updated last year
- ViewState encoder/decoder Fiddler Plugin☆11Jul 9, 2009Updated 16 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- ☆17May 28, 2023Updated 2 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- ☆19Sep 21, 2020Updated 5 years ago
- A simple "ransomware" using powershell☆14May 31, 2021Updated 4 years ago
- Challenge pour l'édition 2022 du midnight flag☆16May 2, 2022Updated 3 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- Markov Chain based fraud detection system in Spark.☆14Feb 9, 2016Updated 10 years ago
- A documentation of Italo's rest api.☆11Nov 25, 2021Updated 4 years ago
- ☆14Mar 6, 2023Updated 3 years ago
- List of tools to assist in analyzing samples of ISFB/Gozi/Ursnif☆15Jul 17, 2019Updated 6 years ago
- Documentation and notes on using the Hiew editor.☆18Mar 22, 2022Updated 4 years ago
- ☆23May 24, 2024Updated last year
- A tour of what some Rust language features look like after compilation.☆50Jun 7, 2023Updated 2 years ago
- Powershell sandboxing utility☆20Mar 2, 2026Updated 2 weeks ago
- A simple XposedHook example on Android.☆15Oct 17, 2018Updated 7 years ago
- ☆26Dec 7, 2019Updated 6 years ago
- A collection of tools written by Brandon Sterne☆26Aug 27, 2018Updated 7 years ago
- Daily Updates of AWS IAM Data☆22Mar 14, 2026Updated last week
- Design and solutions to build a popular self hosting service☆22Dec 31, 2025Updated 2 months ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 3 months ago
- Different code-injections techniques under a common tool☆30May 3, 2020Updated 5 years ago
- IDA's Lumina feature, reimplemented for Binary Ninja☆29Feb 22, 2023Updated 3 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- Docker-compose environment for Cardano Node.☆15Feb 10, 2026Updated last month
- Parsifal : an OCaml-based parsing engine☆65Jan 12, 2021Updated 5 years ago
- ☆33Mar 7, 2026Updated 2 weeks ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Jul 6, 2023Updated 2 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Feb 15, 2017Updated 9 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- IDA's Lumina feature, reimplemented for Binary Ninja, with new error handeling!☆40Dec 5, 2024Updated last year
- Python bindings for BochsCPU☆39Aug 10, 2025Updated 7 months ago
- Homemade script similar to update periodically your OVH DNS via DynHost☆17Apr 23, 2018Updated 7 years ago