☆24Jan 24, 2019Updated 7 years ago
Alternatives and similar repositories for OWASP_MobileMalwareSession
Users that are interested in OWASP_MobileMalwareSession are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android malware threats that spread in 2018☆47Feb 15, 2019Updated 7 years ago
- TriFlow: Triaging Android Applications using Speculative Information Flows☆13Dec 26, 2022Updated 3 years ago
- Popular Android threats in 2019☆253Jan 1, 2020Updated 6 years ago
- ☆14Jul 31, 2019Updated 6 years ago
- ☆54Aug 30, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple Golang program to collect proxies☆13Aug 9, 2019Updated 6 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- This is a Rubber Ducky script that downloads an executable file externally while bypassing Windows antivirus and added to the exclusions …☆15Jul 29, 2021Updated 4 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Nov 23, 2022Updated 3 years ago
- Popular Android malware seen in 2020☆330Jan 6, 2021Updated 5 years ago
- Fighting String Encryption in Android Malware☆59May 23, 2022Updated 3 years ago
- D3DQuake is id Software's Quake modified to use Direct3D 7.0.☆10Aug 23, 2014Updated 11 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Feb 15, 2019Updated 7 years ago
- Malware capable of controlling many remote machines.☆24Dec 28, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- C SAMv3 library☆34Jan 14, 2026Updated 2 months ago
- EmoKill is an Emotet process detection and killing tool for Windows OS. It avoids wasting time after detection of Emotet. Any process t…☆13Dec 8, 2022Updated 3 years ago
- BleachBit documentation☆12Mar 19, 2026Updated last week
- 🚀Steal Tdata from PC (FTP)☆16May 19, 2020Updated 5 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- If you just got a fresh Windows 10 and you don't know why your Internet stopped working around the same time, try this. These are scripts…☆11Jan 15, 2025Updated last year
- A multi-page Guide to create a Multiboot-USB-Stick for IT-Technicians that use Boot CDs on a daily basis.☆16Jun 11, 2018Updated 7 years ago
- Drag and drop a hosts file to convert it.☆14Jan 15, 2025Updated last year
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code Search on Fess☆11Nov 2, 2024Updated last year
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- PHP Vulnerability Hunter (fork)☆13May 8, 2015Updated 10 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- i2p router implementation in C11☆11Nov 14, 2017Updated 8 years ago
- ☆43Feb 20, 2016Updated 10 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- Bitcoin miner by Raphael Frajuca(Badguy5552)☆11Oct 10, 2017Updated 8 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CVE-2017-13156-Janus复现☆13Sep 7, 2020Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Integrated Windows Authentication in Java☆12Updated this week
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago