Visit Website

Largest open collection of Android malware samples. Live samples - use them at your peril. Collected from several sources/mailing lists. Contributions are welcome - please create a new directory for every sample type, add a README file and samples in that directory. This repository contains a collection of Android malware samples, which can be used for research, testing, and analysis. The samples are collected from various sources and are made available for the benefit of the security community. Please note that the samples are live and should be used with caution. It is recommended to use a virtual environment or a sandboxed environment to analyze the samples. Contributions are welcome! If you have a new sample to add, please create a new directory for it and add a README file with information about the sample. This repository is maintained by [insert name] and is hosted on [insert hosting platform].

FEATURES

ALTERNATIVES

Krakatau provides an assembler and disassembler for Java bytecode, supporting conversion, creation, examination, comparison, and decompilation of Java binaries.

YARA module for supporting DCSO format bloom filters with hashlookup capabilities.

A cutting-edge AI-based IT security platform that identifies malware and cyber-attacks within seconds

An online hash checker utility that retrieves information from various online sources, including Virustotal, HybridAnalysis, and more.

A command-line utility for examining Objective-C runtime information in Mach-O files and generating class declarations.

A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.

A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.

Educational resources for reverse engineering tutorials by lena151.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved