Popular Android malware for 2021
☆37Mar 9, 2022Updated 4 years ago
Alternatives and similar repositories for AndroidMalware_2021
Users that are interested in AndroidMalware_2021 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malicious Apk For Android☆18Jun 30, 2022Updated 3 years ago
- Popular Android malware seen in 2020☆330Jan 6, 2021Updated 5 years ago
- 'apk-yara-checker' is a little CLI tool written in Rust to check Yara rules against a folder of APK files.☆16Jul 6, 2024Updated last year
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of the malware I use☆10Jul 24, 2024Updated last year
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Mar 17, 2026Updated last week
- Property extractor for Android apps☆311Mar 24, 2025Updated last year
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 2 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 12 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- A new idea to build an anti ransomware☆24Oct 4, 2020Updated 5 years ago
- Find and Meet KOLs on Facebook Taiwan president election Analisis by SNA and NLP☆12Dec 29, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ShadowDigger: A Python CLI tool for SQLite DB management and doxing. It allows data creation, insertion, and querying, catering to doxing…☆10Jul 9, 2023Updated 2 years ago
- ☆54Aug 30, 2017Updated 8 years ago
- ☆14Jul 1, 2022Updated 3 years ago
- Statically unpacking common android banker malware.☆160Apr 2, 2025Updated 11 months ago
- MetaHarvest - is designed to extract rich, structured metadata from any given list of websites. It taps into web page contents to retriev…☆29Sep 16, 2025Updated 6 months ago
- 🕵️ An android library to detect ADB debug☆17Jun 29, 2022Updated 3 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- ARMANDroid - anti-repackaging tool for Android apps☆15Dec 18, 2020Updated 5 years ago
- ☆23Apr 27, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆18Sep 24, 2024Updated last year
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- Trace function calls using lldb☆13Jul 5, 2021Updated 4 years ago
- CTF source code(s) from multiple websites.☆10May 4, 2025Updated 10 months ago
- Android malware threats that spread in 2018☆47Feb 15, 2019Updated 7 years ago
- IFL - Interactive Functions List (plugin for Binary Ninja)☆25Jul 9, 2024Updated last year
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Nov 16, 2018Updated 7 years ago
- A very very very simple tool to compile folder to fake ps4/ps5 pkg☆16Dec 3, 2023Updated 2 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆21May 26, 2024Updated last year
- jar or dex tools☆10Mar 24, 2016Updated 10 years ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 3 years ago
- Examples of the obfuscated APKs (using manifesto and/or other techniques)☆30Jan 9, 2015Updated 11 years ago
- Find existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve ca…☆17Aug 4, 2023Updated 2 years ago
- ☆13Jun 10, 2022Updated 3 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago