sh4d0wlesss / Android-Malware-Analysis
This repo contain Android malware samples and analysis
☆13Updated 4 years ago
Alternatives and similar repositories for Android-Malware-Analysis:
Users that are interested in Android-Malware-Analysis are comparing it to the libraries listed below
- qiling framework examples☆16Updated 3 years ago
- Notes for Assembly language☆14Updated 4 years ago
- ☆18Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Updated 7 years ago
- ☆27Updated 4 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆14Updated 3 years ago
- STMCTF#18 PWN soruları writeup☆4Updated 6 years ago
- generate yara-androguard report on your local and scan☆12Updated 5 years ago
- ☆15Updated 4 years ago
- Using Spotify Playlists as Malware CDN☆26Updated 4 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- Basic XSS Scanner☆11Updated 4 years ago
- Dhkos ctf çözümleri☆8Updated 6 years ago
- Writeup and scripts for the 2021 malwarebytes crackme☆10Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Modular reverse shell server with a Discord frontend and example payloads☆28Updated 4 years ago
- URLScan Go API client☆7Updated 4 years ago
- Linux ortamına ait Anti-Analiz teknikleri uygulaması.☆10Updated 7 years ago
- ☆16Updated 5 years ago
- ATLAS - Malware Analysis Description☆20Updated last year
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 4 years ago
- Our team's CTF writeups☆10Updated 5 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- IoC Feed for security analysts etc.☆13Updated 2 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- Sources code extracted from malwares for analysis☆36Updated 2 years ago
- Analyses/Exploits Of The 0Day Vulnerabilities I Found On Various Softwares☆8Updated 3 years ago
- ☆22Updated 10 months ago