该仓库手机恶意软件源码,以不同编程语言、不同平台上实现
#Awesome#A curated list of awesome YARA rules, tools, and people.
翻译 - 精选的YARA规则,工具和人员的精选清单。
#安卓#Android Reverse-Engineering Workbench for VS Code
#安卓#Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
翻译 - 扫描所有正在运行的进程。识别并转储各种潜在的恶意植入(替换/植入的 PE、shellcode、挂钩、内存中的补丁)。
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with...
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.
a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containe...
Emotet detection tool for Windows OS
翻译 - Windows OS的Emotet检测工具
#安卓#APK/DEX detector for Windows, Linux and MacOS.
Linker/Compiler/Tool detector for Windows, Linux and MacOS.
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
FCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Drltrace is a library calls tracer for Windows and Linux applications.
An open source framework for enterprise level automated analysis.
Collection of private Yara rules.
#计算机科学#Awesome graph anomaly detection techniques built based on deep learning frameworks. Collections of commonly used datasets, papers as well as implementations are listed in this github repository. We al...