Yet Another Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
☆115Apr 25, 2016Updated 10 years ago
Alternatives and similar repositories for Vezir-Project
Users that are interested in Vezir-Project are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stanford's Machine Learning Exercises☆12Apr 7, 2020Updated 6 years ago
- ☆56May 30, 2017Updated 8 years ago
- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis☆1,157May 31, 2023Updated 2 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆113May 7, 2015Updated 11 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆25Apr 1, 2023Updated 3 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- Yet another static code analyzer for malicious Android applications☆529Jan 21, 2020Updated 6 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Aug 13, 2018Updated 7 years ago
- appland client☆19Jul 30, 2015Updated 10 years ago
- ☆90Mar 15, 2017Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 10 years ago
- ☆11Feb 14, 2025Updated last year
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- NLog Target for GrayLog2☆17Mar 29, 2019Updated 7 years ago
- Search Termux Commands and Guide in Termux !!☆12Apr 9, 2026Updated last month
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Stuff you might use when exploiting software☆82Nov 8, 2015Updated 10 years ago
- Droidefense: Advance Android Malware Analysis Framework☆481Dec 14, 2022Updated 3 years ago
- Tool used for dumping memory from Android devices☆70Jun 12, 2015Updated 10 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- aptoide app store APK download☆27Jul 31, 2015Updated 10 years ago
- MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile applicat…☆669Jul 26, 2019Updated 6 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Symbolic/concolic execution of Android apps☆56Mar 8, 2016Updated 10 years ago
- ☆197Sep 27, 2018Updated 7 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆75Apr 1, 2023Updated 3 years ago
- Undefined Behaviour Snippets☆17Apr 3, 2017Updated 9 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆31May 8, 2015Updated 11 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Mar 7, 2023Updated 3 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago