该仓库手机恶意软件源码,以不同编程语言、不同平台上实现
#Awesome#A curated list of awesome YARA rules, tools, and people.
#安卓#Android Reverse-Engineering Workbench for VS Code
#安卓#Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with...
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.
a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containe...
#安卓#APK/DEX detector for Windows, Linux and MacOS.
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
Linker/Compiler/Tool detector for Windows, Linux and MacOS.
FCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Drltrace is a library calls tracer for Windows and Linux applications.
An open source framework for enterprise level automated analysis.
#计算机科学#Awesome graph anomaly detection techniques built based on deep learning frameworks. Collections of commonly used datasets, papers as well as implementations are listed in this github repository. We al...
Collection of private Yara rules.