sh4d0wlesss / Android-Malware-AnalysisLinks
This repo contain Android malware samples and analysis
☆13Updated 4 years ago
Alternatives and similar repositories for Android-Malware-Analysis
Users that are interested in Android-Malware-Analysis are comparing it to the libraries listed below
Sorting:
- Notes for Assembly language☆15Updated 5 years ago
- qiling framework examples☆16Updated 3 years ago
- ☆19Updated 3 years ago
- ☆28Updated 5 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Updated 7 years ago
- generate yara-androguard report on your local and scan☆12Updated 5 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Updated 4 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆74Updated 4 years ago
- Statically unpacking common android banker malware.☆155Updated 5 months ago
- Using Spotify Playlists as Malware CDN☆27Updated 4 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆14Updated 3 years ago
- ☆15Updated 5 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- Winsock accept() Backdoor Implant.☆116Updated 4 years ago
- Some malware samples or suspicious files I found and their reports.☆39Updated 3 years ago
- Malware dynamic instrumentation tool based on frida framework☆108Updated 5 years ago
- Modular reverse shell server with a Discord frontend and example payloads☆28Updated 5 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Updated 3 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- Anti-reverse Compilation☆34Updated 4 years ago
- A small utility to deal with malware embedded hashes.☆52Updated last year
- Malware Analysis (Zararlı Yazılım Analizi)☆31Updated 6 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 6 years ago
- ☆22Updated last year
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- Capa analysis importer for Ghidra.☆62Updated 4 years ago
- API Logger for Windows Executables☆79Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago