Real Android malware apps discussed in the book
☆46Oct 12, 2023Updated 2 years ago
Alternatives and similar repositories for book-content
Users that are interested in book-content are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆16Apr 13, 2024Updated 2 years ago
- Broken web app intentionally built with pentesting obstacles☆16Jun 21, 2019Updated 6 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Feb 8, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.☆11Feb 5, 2024Updated 2 years ago
- ☆55Mar 13, 2026Updated last month
- This informative guide offers essential tips to avoid legal trouble with law enforcement by educating readers on their rights and ways to…☆34Nov 14, 2025Updated 5 months ago
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- ☆12Mar 22, 2024Updated 2 years ago
- ARC4 (Alleged RC4) cryptography provider class library.☆10Dec 15, 2024Updated last year
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- A modern, real-time monitoring dashboard built with FastAPI and Svelte. This application demonstrates real-time data streaming using Serv…☆19Mar 31, 2025Updated last year
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆24Nov 3, 2022Updated 3 years ago
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆13Jun 25, 2020Updated 5 years ago
- CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's…☆18Jul 18, 2023Updated 2 years ago
- ☆12Feb 28, 2025Updated last year
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- Fast and clear TryHackMe desktop application for Windows /Linux / MacOS☆12Feb 6, 2021Updated 5 years ago
- A useful starting point for CFIs, students, and anyone hoping to learn more about aviation.☆16Apr 25, 2026Updated last week
- 🔗 Source for the Caido plugin store☆19Apr 23, 2026Updated last week
- Tool Collection for AOSP and AAOS builds☆14Apr 15, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A curated list of awesome C frameworks, libraries, resources and other shiny things. Inspired by all the other awesome-... projects out t…☆10Aug 4, 2024Updated last year
- Collection of resources for Industrial control system cybersecurity☆17May 30, 2022Updated 3 years ago
- BGraph is a tool designed to generate dependencies graphs from Android.bp soong files.☆21Sep 19, 2025Updated 7 months ago
- 「Rustで始めるネットワークプログラミング」 第5章(web販売版: web-versionブランチ)のリポジトリです。☆11May 8, 2020Updated 5 years ago
- A simple Android application that demonstrates how the end-to-end encryption works.☆13Aug 28, 2020Updated 5 years ago
- Example code of Embedded Programming with Android☆14Apr 20, 2015Updated 11 years ago
- Python package for Dempster-Shafer related computation☆14Mar 16, 2023Updated 3 years ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆41Nov 21, 2021Updated 4 years ago
- files for (μ)scope projects☆11Jul 8, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ATM Configurator aka Tyupkin trojan☆11Mar 23, 2015Updated 11 years ago
- Statically unpacking common android banker malware.☆161Apr 2, 2025Updated last year
- Interactive hacking toolkit.☆14Oct 17, 2018Updated 7 years ago
- Properly Engineered Infection Kit, A framework for creating malware in C#. Multi-threaded, comes with a built-in MSIL obfuscator and pack…☆15Jun 30, 2011Updated 14 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- Bot for Runescape NXT client (non functional currently)☆12Mar 23, 2021Updated 5 years ago
- A utility helping developers to explorer SELinux policies☆16Mar 12, 2026Updated last month