serval-snt-uni-lu / PiggybackingView external linksLinks
Ungrafting Malicious Code from Piggybacked Android Apps
☆14Sep 27, 2016Updated 9 years ago
Alternatives and similar repositories for Piggybacking
Users that are interested in Piggybacking are comparing it to the libraries listed below
Sorting:
- ☆44Oct 15, 2020Updated 5 years ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- ☆32Jul 6, 2023Updated 2 years ago
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- A curated list of malware-related papers.☆34Feb 28, 2024Updated last year
- ☆18Mar 15, 2024Updated last year
- ☆15Feb 21, 2022Updated 3 years ago
- ☆18Apr 4, 2021Updated 4 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated 11 months ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago
- ☆27Jan 17, 2024Updated 2 years ago
- ☆22Feb 14, 2017Updated 9 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆29Dec 17, 2023Updated 2 years ago
- axplorer - Android Permission Mappings☆115May 7, 2020Updated 5 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- LibD: Scalable and Precise Third-party Library Detection in Android Markets☆66May 6, 2019Updated 6 years ago
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆34Aug 10, 2024Updated last year
- CodeMind is a generic framework for evaluating inductive code reasoning of LLMs. It is equipped with a static analysis component that ena…☆42Nov 21, 2025Updated 2 months ago
- Benign .NET files☆42Aug 23, 2024Updated last year
- Using SVF in Python Projects☆15Feb 6, 2026Updated last week
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with dat…☆12Jul 16, 2022Updated 3 years ago
- ☆42Aug 6, 2021Updated 4 years ago
- Lite version of LibRadar☆43Apr 8, 2023Updated 2 years ago
- great android hacking app -enjoy hacking your friends and remember am always never responsible for your malicious activities☆11Jan 19, 2018Updated 8 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆12Updated this week
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated last year
- ☆10Sep 4, 2020Updated 5 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- ☆13Jan 6, 2020Updated 6 years ago
- Reachability analysis and synthesis of parameters for polynomial dynamical systems☆11May 15, 2023Updated 2 years ago
- Simply C program slicing tool in C☆10Jun 19, 2015Updated 10 years ago
- Restores firmware and filesystem to iPhone/iPod Touch☆10Jun 7, 2010Updated 15 years ago
- This application scans all the processes running on your Android Machine and will kill any malicious process. Done by Matt Khazaeli☆10Dec 4, 2016Updated 9 years ago
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆21Feb 2, 2026Updated 2 weeks ago
- ☆14Feb 5, 2024Updated 2 years ago
- DroidMate is an automated GUI execution generator for Android apps.☆39Apr 3, 2020Updated 5 years ago
- 基于SSM实现的招聘考试系统。试题爬取通过WebCollector爬虫框架网上爬取试题,通过Lucene全文搜索试题,通过遗传算法生成试卷☆12Dec 16, 2022Updated 3 years ago