A dockerized droidbox instance
☆25Apr 7, 2016Updated 9 years ago
Alternatives and similar repositories for droidbox
Users that are interested in droidbox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- tenjint is a Python 3-based platform for virtual machine introspection (VMI) on x86 and ARM. This is main Python 3 tenjint library.☆11Feb 9, 2021Updated 5 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆15Dec 16, 2018Updated 7 years ago
- Protection Profile for Mobile Device Fundamentals☆15Mar 17, 2026Updated last week
- to be deleted - check github.com/corkami☆13Sep 16, 2014Updated 11 years ago
- ☆49Mar 14, 2015Updated 11 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112May 7, 2015Updated 10 years ago
- The all-in-one boot image tool.☆23Jan 9, 2015Updated 11 years ago
- Source code and tools of the original Mobile-Sandbox release (outdated)☆22Jun 14, 2015Updated 10 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Non-Alphanumeric Ruby for Fun and Not Much Else☆22Mar 19, 2014Updated 12 years ago
- static taint analysis of hybrid Android Apps (Java + HTML)☆13Jan 9, 2022Updated 4 years ago
- Dynamic analysis of Android apps☆796Jun 22, 2023Updated 2 years ago
- Source code and tools of the former Mobile-Sandbox☆12Jan 4, 2019Updated 7 years ago
- Running TaintDroid from the command line and analyze output☆17Mar 28, 2012Updated 13 years ago
- ☆23May 19, 2019Updated 6 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- ☆32Nov 6, 2019Updated 6 years ago
- Code for the Arduino Home Automation book published by PacktPub☆11Jun 4, 2014Updated 11 years ago
- ☆32Apr 29, 2017Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- Control Tasmota and Zigbee Devices☆10Jan 15, 2026Updated 2 months ago
- AntiTaintDroid - Escaping Taint Analysis (and stealing private information) on Android for Fun and Profit☆42Feb 18, 2018Updated 8 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- HAProxy CE Docker Debian image☆14Updated this week
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 10 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Code for Rumal Backend that will interface with Thug Daemon☆11Nov 24, 2016Updated 9 years ago
- Home of code related to security of network systems.☆25Jan 22, 2025Updated last year
- Dalvik Monitoring Framework for CuckooDroid☆92Jul 29, 2016Updated 9 years ago
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- Analysis related to article on FOIA Online Database.☆11Feb 2, 2017Updated 9 years ago
- BSides Munich Frida Workshop 2018☆48Aug 8, 2018Updated 7 years ago
- 雲蝦米☆20Dec 7, 2022Updated 3 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- Multithreaded HTTP Download Accelerator☆23Jul 27, 2014Updated 11 years ago
- Geolocating Internet infrastructure☆13Apr 26, 2018Updated 7 years ago