generate yara-androguard report on your local and scan
☆12Oct 3, 2019Updated 6 years ago
Alternatives and similar repositories for hacky-yara-androguard
Users that are interested in hacky-yara-androguard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 2 months ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- World's First Haiku Ransomware/Malware☆16Dec 22, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- ☆29May 1, 2020Updated 5 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- STMCTF17 Writeups☆36Nov 8, 2017Updated 8 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- machine learning notes for beginners☆24Nov 19, 2018Updated 7 years ago
- yara-python-dex enabled wheels☆11Aug 31, 2025Updated 6 months ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of awesome tools, books, resources, software, documents and cool stuff about IoT and HW security.☆34Mar 8, 2026Updated 3 weeks ago
- ☆17May 13, 2019Updated 6 years ago
- Popular Android malware seen in 2022☆31Nov 8, 2022Updated 3 years ago
- CTF (Capture The Flag) writeups, code snippets, notes, scripts☆14Dec 28, 2019Updated 6 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- Akgulyzer; komut satiri rastgele metin uretici ve encoder.☆20Feb 10, 2015Updated 11 years ago
- Windows 10/11 unsigned kernel driver load/debugging☆19Feb 17, 2023Updated 3 years ago
- Pentesting Pratic Notes☆15Oct 30, 2021Updated 4 years ago
- ☆13Sep 22, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- CTF binary exploit code☆37Apr 7, 2019Updated 6 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- CNVD-2021-10543:MessageSolution 企业邮件归档管理系统 EEA 存在信息泄露漏洞☆13Mar 28, 2021Updated 5 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 8 months ago
- A fully original Windows anti-virus client from HonestRepair using the same custom antivirus engine as our Cloud.☆16Dec 19, 2019Updated 6 years ago
- Windows Privilege Escalation☆30Aug 14, 2020Updated 5 years ago
- Open-source antivirus project that leverages artificial intelligence to protect your computer from malware and viruses.☆20Sep 24, 2023Updated 2 years ago
- Detection of Android Malware based on system calls using Support Vector Machines.☆12Nov 27, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- ☆105Dec 9, 2019Updated 6 years ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆12Feb 7, 2024Updated 2 years ago
- Meetuplardan arta kalanlar☆42Aug 18, 2025Updated 7 months ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- ☆12Feb 20, 2026Updated last month