ashishb / ios-malware
iOS malware samples
☆43Updated 9 years ago
Alternatives and similar repositories for ios-malware
Users that are interested in ios-malware are comparing it to the libraries listed below
Sorting:
- My favorite resources and tools for malware analysis.☆40Updated 4 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Some YARA rules i will add from time to time☆64Updated 2 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last year
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- A Simple PE File Heuristics Scanners☆49Updated 6 years ago
- Python script to automatically deobfuscate malware code☆59Updated 6 years ago
- Repository of tools used in my blog☆51Updated last year
- Nexus of Android banking Trojans☆15Updated last year
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆84Updated 2 years ago
- ☆26Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆18Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Updated 4 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆44Updated 3 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- ☆55Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Malware captured with honeypots☆38Updated 7 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Methods of C2☆21Updated 9 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Android malware sample library.☆67Updated 3 years ago