android-malware-ml-book / book-contentLinks
Real Android malware apps discussed in the book
☆37Updated last year
Alternatives and similar repositories for book-content
Users that are interested in book-content are comparing it to the libraries listed below
Sorting:
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆34Updated 3 months ago
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆111Updated last year
- A machine learning malware analysis framework for Android apps.☆132Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- ☆25Updated 2 years ago
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆86Updated last year
- Scripts to set up your own Android 📱 app hacking lab☆86Updated last year
- This repository contains a few leaked files of HookBot.☆105Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- Slides and videos from my public speeches / conferences☆76Updated 2 months ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆70Updated 3 weeks ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆43Updated last year
- A list of bizarre crackmes☆121Updated last month
- ☆99Updated 3 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Updated 2 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆37Updated 2 years ago
- Manage (and soon deploy) Android machines with pre-defined behaviors for Cyber Range environments.☆85Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 2 months ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated 2 years ago
- IOCs from zLabs research☆22Updated last week
- Oversecured Vulnerable iOS App☆224Updated last year
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆50Updated 2 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Updated 2 years ago
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆70Updated last year
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆25Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago