Injected malicious code into legitimate andoid applications. Converted a keyboard app into a keylogger and an MP3 downloader into an image thief.
☆19Aug 8, 2014Updated 11 years ago
Alternatives and similar repositories for Android-malware
Users that are interested in Android-malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A keylogger program built on Python . It will send emails after recording keys.☆12May 5, 2024Updated last year
- In recent time there has been an increase of malicious Android applications showing up on both official and unofficial markets. If one ha…☆14Mar 28, 2014Updated 11 years ago
- Android service that publishes user defined location names to a gmail account, based on the current WiFi network.☆14Feb 23, 2011Updated 15 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- Script to download, build, and install the most recent libplist, libusbmuxd, libimobiledevice, libirecovery, idevicerestore, usbmuxd, lib…☆11Feb 16, 2026Updated last month
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- android keylogger app which uses android accessibility service to keep track of users action, with email functionality☆118Jun 11, 2022Updated 3 years ago
- Self-erasable USB drive.☆15Jul 28, 2024Updated last year
- "Spy" on the photos on your Android device☆15Sep 5, 2014Updated 11 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnera…☆17Jan 23, 2022Updated 4 years ago
- Get/dump chrome and firefox saved passwords.☆20Sep 13, 2020Updated 5 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- [OUTDATED AND UNSUPPORTED] Android Surveilance Tool, which works like a HTTP Shell to receive and executes commands and send data to the …☆19Aug 20, 2013Updated 12 years ago
- A Python Binance cryptocurrency trader using a simple profitable strategy☆15Feb 25, 2021Updated 5 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- A Full featured Android keylogger that stores Touches, Notifications and reports its handler via Gmail☆137May 28, 2020Updated 5 years ago
- Proof of Concept example of Android Malware used for Research Purposes☆23Dec 22, 2016Updated 9 years ago
- Harmless Android malware using the overlay technique to steal user credentials.☆89Jan 5, 2018Updated 8 years ago
- This is a Xposed module. It helps to prevent malwares to register service/receiver which were disabled in My Android Tools before.☆29Jun 4, 2015Updated 10 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆46Apr 1, 2022Updated 3 years ago
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- IDA Pro Scripts☆37Feb 24, 2015Updated 11 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- A library to handle Apple Property List format in binary or XML☆18Feb 11, 2012Updated 14 years ago
- ☆15Nov 30, 2020Updated 5 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Sep 28, 2017Updated 8 years ago