h1nayoshi / smalien
Information flow analysis tool for Android applications
☆12Updated 3 years ago
Alternatives and similar repositories for smalien:
Users that are interested in smalien are comparing it to the libraries listed below
- ☆55Updated 7 years ago
- Android malware threats that spread in 2018☆44Updated 6 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- static malware analysis and report tool open source version for linux☆17Updated 7 years ago
- Android Malware Tracker☆27Updated 10 months ago
- iOS malware samples☆43Updated 8 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Updated 6 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆15Updated 5 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆27Updated 7 years ago
- ☆13Updated 2 years ago
- PyCommands for Immunity Debugger☆27Updated 11 years ago
- A tool for malicious behavior detection in IoT devices☆76Updated 6 years ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- Modeling Password Guessability Using Markov Models☆56Updated 5 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- A Simple PE File Heuristics Scanners☆50Updated 5 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆27Updated 9 years ago
- Android Automation Tool☆21Updated 6 years ago
- Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB☆22Updated last year
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆38Updated 7 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated last year
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 8 months ago
- Extract useful semantic from CVE descriptions usinig NLP☆25Updated 2 years ago
- ☆79Updated 2 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated last year
- This repository contains dynamic and static tools for IoT malware analysis☆20Updated 2 years ago
- CapFuzz - capture, fuzz & intercept web traffic.☆64Updated 5 years ago
- ☆25Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago