Real Android malware apps discussed in the book
☆46Oct 12, 2023Updated 2 years ago
Alternatives and similar repositories for book-content
Users that are interested in book-content are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Dec 13, 2023Updated 2 years ago
- Android SSL certificate validation vulnerability detection tools.☆20May 10, 2014Updated 11 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆16Apr 13, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Broken web app intentionally built with pentesting obstacles☆16Jun 21, 2019Updated 6 years ago
- APK black-box obfuscator for my Master's project☆14May 2, 2021Updated 4 years ago
- Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.☆11Feb 5, 2024Updated 2 years ago
- ☆54Mar 13, 2026Updated last month
- This informative guide offers essential tips to avoid legal trouble with law enforcement by educating readers on their rights and ways to…☆34Nov 14, 2025Updated 5 months ago
- Generates a change log between different aosp tags. Based on the wonderful work of @alsutton☆13Apr 6, 2026Updated last week
- One script to create a permission-based dataset of android applications for your next ML Malware Detection gizmo.☆18Dec 1, 2022Updated 3 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Jun 15, 2023Updated 2 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A modern, real-time monitoring dashboard built with FastAPI and Svelte. This application demonstrates real-time data streaming using Serv…☆19Mar 31, 2025Updated last year
- ☆24Nov 3, 2022Updated 3 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- SMI230 sensor android hal☆13Mar 20, 2025Updated last year
- ☆15Dec 12, 2025Updated 4 months ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- Scripts to unpack APK protected by Legu☆15Feb 11, 2025Updated last year
- A useful starting point for CFIs, students, and anyone hoping to learn more about aviation.☆16Updated this week
- 🔗 Source for the Caido plugin store☆17Apr 8, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A curated list of awesome C frameworks, libraries, resources and other shiny things. Inspired by all the other awesome-... projects out t…☆10Aug 4, 2024Updated last year
- 「Rustで始めるネットワークプログラミング」 第5章(web販売版: web-versionブランチ)のリポジトリです。☆11May 8, 2020Updated 5 years ago
- A simple Android application that demonstrates how the end-to-end encryption works.☆13Aug 28, 2020Updated 5 years ago
- Example code of Embedded Programming with Android☆14Apr 20, 2015Updated 10 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- Python package for Dempster-Shafer related computation☆14Mar 16, 2023Updated 3 years ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆41Nov 21, 2021Updated 4 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago
- RuneScape Development Kit☆20Jun 18, 2011Updated 14 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 11 years ago
- Statically unpacking common android banker malware.☆162Apr 2, 2025Updated last year
- Interactive hacking toolkit.☆14Oct 17, 2018Updated 7 years ago
- Properly Engineered Infection Kit, A framework for creating malware in C#. Multi-threaded, comes with a built-in MSIL obfuscator and pack…☆15Jun 30, 2011Updated 14 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- Bot for Runescape NXT client (non functional currently)☆12Mar 23, 2021Updated 5 years ago
- A utility helping developers to explorer SELinux policies☆16Mar 12, 2026Updated last month