generate yara-androguard report on your local and scan
☆12Oct 3, 2019Updated 6 years ago
Alternatives and similar repositories for hacky-yara-androguard
Users that are interested in hacky-yara-androguard are comparing it to the libraries listed below
Sorting:
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated last month
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- ☆29May 1, 2020Updated 5 years ago
- A collection of awesome tools, books, resources, software, documents and cool stuff about IoT and HW security.☆33May 4, 2025Updated 10 months ago
- STMCTF17 Writeups☆36Nov 8, 2017Updated 8 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 3 years ago
- A tool pulls loaded binaries ordered by memory regions☆35Sep 27, 2019Updated 6 years ago
- Statically unpacking common android banker malware.☆160Apr 2, 2025Updated 11 months ago
- Pentesting Pratic Notes☆15Oct 30, 2021Updated 4 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- Meetuplardan arta kalanlar☆42Aug 18, 2025Updated 6 months ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆24Jul 25, 2023Updated 2 years ago
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆37Updated this week
- a utility-first, modern and progressive CSS framework by Eser Ozvataf☆27Jun 10, 2020Updated 5 years ago
- Popular Android malware seen in 2022☆31Nov 8, 2022Updated 3 years ago
- Typer text editor featured in "Millennium Computing" Win32/C video tutorials☆31Sep 1, 2019Updated 6 years ago
- a repo of links to useful writeups of pwn challenges☆31Jul 22, 2018Updated 7 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- CTF binary exploit code☆37Apr 7, 2019Updated 6 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆32Aug 1, 2019Updated 6 years ago
- ☆11Dec 13, 2016Updated 9 years ago
- CyberX-AI-Digital-Twin is an AI-powered cybersecurity platform that uses digital twin technology to simulate, detect, and analyze cyber t…☆14Feb 13, 2025Updated last year
- ☆105Dec 9, 2019Updated 6 years ago
- Türkiye'ye Yönelik Zararlı Bağlantı Erişim Engelleme Listesi☆65Aug 6, 2021Updated 4 years ago
- ☆145Jan 8, 2020Updated 6 years ago
- A Flutter application for wiki search.☆13Jan 27, 2021Updated 5 years ago
- A Fractional NFT Lending platform that supports 1-to-many relation between borrower and lenders with collateral protection for borrower o…☆11Feb 28, 2023Updated 3 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Farmers League Gaming and NFT - Contracts and scripts☆11Sep 4, 2022Updated 3 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- Mint Site for the FloriNouns NFT collection☆11Jun 12, 2023Updated 2 years ago
- Implementation of TraFix (automatic trainable decompiler based on NMT) as published in ArXiv☆40Nov 23, 2019Updated 6 years ago
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Feb 3, 2023Updated 3 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- The first 100% open-source Firewall for Windows 8/10/11 based on domain names !☆11Jul 6, 2022Updated 3 years ago
- Watch & Hook python methods☆32Aug 26, 2019Updated 6 years ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago