In recent time there has been an increase of malicious Android applications showing up on both official and unofficial markets. If one had a tool that via sandboxing technique would provide an initial perspective on a package's behavior, one could reduce the risk of getting exposed to such malware. To accomplish this, the sandbox will utilize s…
☆14Mar 28, 2014Updated 12 years ago
Alternatives and similar repositories for Android-Application-SandBox
Users that are interested in Android-Application-SandBox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Injected malicious code into legitimate andoid applications. Converted a keyboard app into a keylogger and an MP3 downloader into an imag…☆19Aug 8, 2014Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆16Jul 6, 2014Updated 11 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 11 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Feb 23, 2016Updated 10 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- apktool on Android☆13Mar 25, 2022Updated 4 years ago
- Android malware static & dynamic analysis and automated action (deprecated)☆21May 18, 2021Updated 4 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- A library to handle Apple Property List format in binary or XML☆18Feb 11, 2012Updated 14 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- a set of tools/scripts to obfuscate and manipulate dex files☆120Feb 18, 2015Updated 11 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- hentai game manager, mostly for f95, but might add other sites later☆11Nov 4, 2025Updated 5 months ago
- More simple and convenient C++ library to manipulate json and plist, maybe better than libplist.☆18Feb 7, 2025Updated last year
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- A Simple Http to Raw Socket Adapter for Android☆12Aug 30, 2015Updated 10 years ago
- 360的Xposed Hook框架, 支持Android P☆15Mar 19, 2018Updated 8 years ago
- iDevice Bootloader Recovery Shell☆22Jan 17, 2013Updated 13 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Eclipse plugin to remote adb to an android device.☆24May 10, 2013Updated 12 years ago
- Restores firmware and filesystem to iPhone/iPod Touch☆11Jun 7, 2010Updated 15 years ago
- A library to handle Apple Property List format whereas it's binary or XML☆53Aug 23, 2010Updated 15 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆13Nov 5, 2020Updated 5 years ago
- Android App for software security project. unisannio☆16Feb 20, 2017Updated 9 years ago
- android app for malware detection☆28Jan 6, 2018Updated 8 years ago
- Mimicking grids in Android lists☆148Apr 15, 2015Updated 10 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 用于对接所有的跨境电商的API开发的SDK包☆16Apr 26, 2022Updated 3 years ago
- SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with dat…☆12Jul 16, 2022Updated 3 years ago
- Website/Frontend for MTG Arena Tool☆13Jan 8, 2023Updated 3 years ago
- The Fiwalld is a free full-featured firewall on Android, keeps you away from malicious apps.☆11Jun 30, 2024Updated last year
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- Sample code for ICS security blog posts☆19Dec 2, 2012Updated 13 years ago
- ☆13Jan 14, 2021Updated 5 years ago