StackeredSAS / AMAnDeLinks
Extract, gather and analyze information from an Android Manifest file or an APK.
☆19Updated 2 years ago
Alternatives and similar repositories for AMAnDe
Users that are interested in AMAnDe are comparing it to the libraries listed below
Sorting:
- ☆55Updated 10 months ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆68Updated 10 months ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Rapports techniques de VIGINUM☆35Updated 3 months ago
- DEbian Cve REproducer Tool☆25Updated 2 weeks ago
- Web Application for domain name monitoring / alerting☆64Updated last year
- ☆25Updated 3 years ago
- Sandbox samples and monitor them with kunai☆25Updated last month
- ☆23Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆58Updated 3 weeks ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- The core backend server handling API requests and task management☆44Updated this week
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆57Updated 2 months ago
- USB Scanning device☆28Updated this week
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆267Updated this week
- C2 Active Scanner☆59Updated last year
- Case, knowledge management and digital investigation platform☆25Updated 2 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated last month
- Examine Chrome extensions for security issues☆85Updated 5 months ago
- ☆26Updated last year
- Automated vulnerability discovery and annotation☆67Updated last year
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Offensive Research Guide to Help Defense Improve Detection☆31Updated 2 years ago
- TAPIR is a multi-user, client/server, incident response framework☆44Updated 3 years ago
- Challenge Instances on Demand, anywhere at any time☆19Updated this week
- ☆16Updated 6 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆49Updated 5 months ago