Proof of Concept example of Android Malware used for Research Purposes
☆22Dec 22, 2016Updated 9 years ago
Alternatives and similar repositories for AndroidMalwareExample
Users that are interested in AndroidMalwareExample are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Configurable, flexible regex-based APK modification tool.☆37Jun 26, 2017Updated 8 years ago
- Popular Android malware seen in 2022☆33Nov 8, 2022Updated 3 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- http://forum.xda-developers.com/xposed/modules/mod-advanced-logging-t3472533☆24Feb 23, 2020Updated 6 years ago
- 🕵️ The crappy, magical string Java/Android decrypter☆11Jan 26, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- Obfuscator for android res.安卓res资源混淆器☆28Dec 31, 2015Updated 10 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Harmless Android malware using the overlay technique to steal user credentials.☆89Jan 5, 2018Updated 8 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆13Dec 8, 2019Updated 6 years ago
- Injected malicious code into legitimate andoid applications. Converted a keyboard app into a keylogger and an MP3 downloader into an imag…☆19Aug 8, 2014Updated 11 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- Protect you android app from tampering.☆28Jan 3, 2021Updated 5 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- RuneScape Development Kit☆20Jun 18, 2011Updated 14 years ago
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 11 years ago
- Properly Engineered Infection Kit, A framework for creating malware in C#. Multi-threaded, comes with a built-in MSIL obfuscator and pack…☆15Jun 30, 2011Updated 14 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bot for Runescape NXT client (non functional currently)☆12Mar 23, 2021Updated 5 years ago
- Example Android app using google-cloud-translate☆20Nov 2, 2016Updated 9 years ago
- A script to make AndroidManifest.xml can not be decompiled by jadx or apktool but can run on Android system.☆15Dec 5, 2022Updated 3 years ago
- A personal filterlist for blocking trackers/ads/malware/antiadblock/adware/data-mining and all other unacceptable/unwarranted network re…☆11Oct 4, 2022Updated 3 years ago
- oneHookLibraryIOS☆11Dec 29, 2020Updated 5 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- A toolkit to get you started with organizing your own hack week!☆12Feb 4, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Players' Unknown Battleground Vulnerabilities Test PoC☆18Apr 15, 2019Updated 6 years ago
- Android application hooking tool based on VirtualHook/VirtualApp☆63Jun 25, 2017Updated 8 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- ☆11May 19, 2018Updated 7 years ago
- ☆13Feb 18, 2022Updated 4 years ago
- A game only for hackers !!☆19Aug 18, 2018Updated 7 years ago
- Audio visualization system based of Koch Fractals with Unity☆12Sep 28, 2018Updated 7 years ago