android-malware-ml-book / book-content
Real Android malware apps discussed in the book
☆36Updated last year
Related projects ⓘ
Alternatives and complementary repositories for book-content
- Challenge Python☆19Updated last year
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆26Updated 3 months ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆21Updated 5 months ago
- damn-exploitable-android-app-apk☆32Updated last year
- A collection of tools that I use in CTF's or for assessments☆59Updated last month
- ☆75Updated 3 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated last year
- ☆31Updated 3 weeks ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆18Updated 4 years ago
- ☆15Updated 6 months ago
- Lena's scripts/code/resources for malware analysis☆25Updated 5 months ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆28Updated last year
- Some Useful Tricks for Pentest Android and iOS Apps☆61Updated 3 weeks ago
- Slides and videos from my public speeches / conferences☆70Updated 3 weeks ago
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆94Updated last year
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆41Updated 2 years ago
- ☆20Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆19Updated last year
- ☆130Updated last year
- ☆26Updated 2 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆25Updated last year
- Modules for my C2 course students to use for their own projects.☆73Updated last year