Dynamic malware analysis for the Android platform
☆40Sep 26, 2014Updated 11 years ago
Alternatives and similar repositories for antimalware
Users that are interested in antimalware are comparing it to the libraries listed below
Sorting:
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- android malware detection☆12Mar 16, 2016Updated 9 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Android Malware Detection Framework☆81Jan 4, 2017Updated 9 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- A(nother) Binary Analysis Framework☆30Jun 10, 2014Updated 11 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- ELF header abuse☆50Mar 23, 2016Updated 9 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- Android malware static & dynamic analysis and automated action (deprecated)☆21May 18, 2021Updated 4 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 11 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 2 months ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago