UDcide / udcide
Android Malware Behavior Deleter
☆34Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for udcide
- Android malware sample library.☆64Updated 2 years ago
- A Collection of Android Malware☆18Updated 5 years ago
- Android Malware Samples☆77Updated 3 years ago
- ☆54Updated 7 years ago
- Nexus of Android banking Trojans☆15Updated last year
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Updated last year
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- A minimalistic android backdoor☆15Updated 4 years ago
- A list of awesome malware detection tools☆72Updated 2 years ago
- My favorite resources and tools for malware analysis.☆40Updated 4 years ago
- ☆26Updated 3 years ago
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆45Updated 3 years ago
- Popular Android malware seen in 2022☆25Updated 2 years ago
- Repository of tools used in my blog☆49Updated 8 months ago
- A simple and scalable Android bot emulation framework, as presented at Black Hat Europe 2021's Arsenal, as well as atHack 2021's Arsenal☆27Updated 3 years ago
- iOS malware samples☆36Updated 8 years ago
- Collection of android malware samples☆53Updated 7 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆13Updated 4 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 5 years ago
- A machine learning malware analysis framework for Android apps.☆118Updated 7 months ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆21Updated 6 years ago
- Android Crypter/Decrypter App Generator☆46Updated 5 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Updated 5 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆42Updated 2 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Malicious Software SRC Extract☆30Updated last year