android-malware-ml-book / book-contentLinks
Real Android malware apps discussed in the book
☆40Updated last year
Alternatives and similar repositories for book-content
Users that are interested in book-content are comparing it to the libraries listed below
Sorting:
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆36Updated 5 months ago
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- A machine learning malware analysis framework for Android apps.☆133Updated last year
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆115Updated 2 years ago
- Detect code obfuscation through text classification in the detection process.☆44Updated last year
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆30Updated 4 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆87Updated last year
- External Playbooks for Public Access☆39Updated 8 months ago
- Challenge Python☆19Updated 2 years ago
- ☆99Updated 4 years ago
- Collection of my Security Blueprints & Guides☆51Updated last week
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- ☆25Updated 2 years ago
- A list of bizarre crackmes☆122Updated 3 months ago
- Slides and videos from my public speeches / conferences☆76Updated 4 months ago
- ☆28Updated last year
- Scripts to set up your own Android 📱 app hacking lab☆91Updated last year
- This repository contains a few leaked files of HookBot.☆105Updated 2 years ago
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆72Updated 2 years ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- A collection of interesting and diverse Android malware samples☆34Updated 2 years ago
- ☆88Updated last year
- My talks and papers☆37Updated last week
- Manage (and soon deploy) Android machines with pre-defined behaviors for Cyber Range environments.☆86Updated last year
- ☆25Updated 2 years ago
- IOCs from zLabs research☆24Updated last month
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆19Updated 5 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆44Updated last year