Yet Another Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
☆115Apr 25, 2016Updated 9 years ago
Alternatives and similar repositories for Vezir-Project
Users that are interested in Vezir-Project are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stanford's Machine Learning Exercises☆12Apr 7, 2020Updated 6 years ago
- ☆56May 30, 2017Updated 8 years ago
- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis☆1,158May 31, 2023Updated 2 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆113May 7, 2015Updated 10 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆25Apr 1, 2023Updated 3 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- Yet another static code analyzer for malicious Android applications☆527Jan 21, 2020Updated 6 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Aug 13, 2018Updated 7 years ago
- appland client☆19Jul 30, 2015Updated 10 years ago
- ☆90Mar 15, 2017Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- ☆11Feb 14, 2025Updated last year
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- NLog Target for GrayLog2☆17Mar 29, 2019Updated 7 years ago
- Search Termux Commands and Guide in Termux !!☆12Apr 9, 2026Updated last week
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Stuff you might use when exploiting software☆82Nov 8, 2015Updated 10 years ago
- Droidefense: Advance Android Malware Analysis Framework☆480Dec 14, 2022Updated 3 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- Tool used for dumping memory from Android devices☆70Jun 12, 2015Updated 10 years ago
- Source code for the beta release of CobraDroid☆14Mar 8, 2020Updated 6 years ago
- aptoide app store APK download☆27Jul 31, 2015Updated 10 years ago
- MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile applicat…☆672Jul 26, 2019Updated 6 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Symbolic/concolic execution of Android apps☆56Mar 8, 2016Updated 10 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆197Sep 27, 2018Updated 7 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆75Apr 1, 2023Updated 3 years ago
- Undefined Behaviour Snippets☆17Apr 3, 2017Updated 9 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago