android-malware-ml-book / book-contentLinks
Real Android malware apps discussed in the book
☆38Updated last year
Alternatives and similar repositories for book-content
Users that are interested in book-content are comparing it to the libraries listed below
Sorting:
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆36Updated 4 months ago
- A machine learning malware analysis framework for Android apps.☆132Updated last year
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆111Updated last year
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- Slides and videos from my public speeches / conferences☆76Updated 3 months ago
- Challenge Python☆19Updated 2 years ago
- A collection of interesting and diverse Android malware samples☆33Updated 2 years ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆36Updated 2 years ago
- Collection of my Security Blueprints & Guides☆51Updated last month
- A curated list of awesome binary analysis automation training, resources, and tools.☆44Updated last year
- My talks and papers☆37Updated 2 months ago
- Scripts to set up your own Android 📱 app hacking lab☆88Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- IOCs from zLabs research☆23Updated last week
- ☆98Updated 3 years ago
- A list of bizarre crackmes☆122Updated 2 months ago
- Oversecured Vulnerable iOS App☆224Updated last year
- External Playbooks for Public Access☆39Updated 6 months ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆18Updated 5 years ago
- ☆25Updated 2 years ago
- Manage (and soon deploy) Android machines with pre-defined behaviors for Cyber Range environments.☆86Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆22Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆18Updated last year
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆54Updated 3 years ago