ashishb / ios-malware
iOS malware samples
☆42Updated 8 years ago
Alternatives and similar repositories for ios-malware:
Users that are interested in ios-malware are comparing it to the libraries listed below
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- A Simple PE File Heuristics Scanners☆50Updated 5 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- A Collection of Android Malware☆18Updated 5 years ago
- Nexus of Android banking Trojans☆15Updated last year
- A curated list of malware repositories, trackers and malware analysis tools☆84Updated last year
- Ransomware Decryptors☆34Updated 2 years ago
- Python script to automatically deobfuscate malware code☆58Updated 6 years ago
- Android Malware Tracker☆27Updated 9 months ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆22Updated 7 years ago
- ☆27Updated 3 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆43Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- ☆15Updated 2 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆18Updated 5 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- A Maltego transform for VirusTotal Submitter Information☆32Updated 5 years ago
- Shock the shell! Exploit many injection method for shellshock☆17Updated 6 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 5 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Methods of C2☆21Updated 9 years ago
- ☆51Updated 3 years ago