ThisIsLibra / m3
A simple and scalable Android bot emulation framework, as presented at Black Hat Europe 2021's Arsenal, as well as atHack 2021's Arsenal
☆28Updated 3 years ago
Alternatives and similar repositories for m3:
Users that are interested in m3 are comparing it to the libraries listed below
- Popular Android malware for 2021☆41Updated 3 years ago
- My malware analysis code snippets☆27Updated last year
- ☆28Updated 2 years ago
- Telegrip is a digital forensic tool that provides acquistion and analysis for Telegram-related cases.☆17Updated 2 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- ☆38Updated 2 months ago
- ☆37Updated 3 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- A collection of interesting and diverse Android malware samples☆32Updated last year
- My talks and papers☆37Updated 3 weeks ago
- Royal Road RTF Weaponizer object decoder☆24Updated 7 months ago
- Anti-reverse Compilation☆33Updated 4 years ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆72Updated last year
- Python wrappers for mal_unpack☆36Updated last year
- ☆24Updated 2 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 2 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆128Updated last year
- Malware dynamic instrumentation tool based on frida framework☆105Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- A feed of malware samples curated from threat intelligence sources.☆26Updated last year
- extract info from apk files☆74Updated last month
- Emulator for Windows Malware Analysis☆15Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 7 months ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- ☆23Updated 2 years ago