Android Malware Samples Logo

Android Malware Samples

0
Free
Visit Website

Largest open collection of Android malware samples. Live samples - use them at your peril. Collected from several sources/mailing lists. Contributions are welcome - please create a new directory for every sample type, add a README file and samples in that directory. This repository contains a collection of Android malware samples, which can be used for research, testing, and analysis. The samples are collected from various sources and are made available for the benefit of the security community. Please note that the samples are live and should be used with caution. It is recommended to use a virtual environment or a sandboxed environment to analyze the samples. Contributions are welcome! If you have a new sample to add, please create a new directory for it and add a README file with information about the sample. This repository is maintained by [insert name] and is hosted on [insert hosting platform].

FEATURES

ALTERNATIVES

YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.

A tool for identifying sensitive secrets in public GitHub repositories

PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.

Define and validate YARA rule metadata with CCCS YARA Specification.

VxSig is a tool to automatically generate AV byte signatures from similar binaries.

A project providing open-source YARA rules for malware and malicious file detection

Copy executables with execute, but no read permission on Unix systems.

A .NET wrapper for libyara that provides a simplified API for developing tools in C# and PowerShell.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved