Largest open collection of Android malware samples. Live samples - use them at your peril. Collected from several sources/mailing lists. Contributions are welcome - please create a new directory for every sample type, add a README file and samples in that directory. This repository contains a collection of Android malware samples, which can be used for research, testing, and analysis. The samples are collected from various sources and are made available for the benefit of the security community. Please note that the samples are live and should be used with caution. It is recommended to use a virtual environment or a sandboxed environment to analyze the samples. Contributions are welcome! If you have a new sample to add, please create a new directory for it and add a README file with information about the sample. This repository is maintained by [insert name] and is hosted on [insert hosting platform].
FEATURES
SIMILAR TOOLS
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A program to manage yara ruleset in a database with support for different databases and configuration options.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
A collaborative malware analysis framework with various features for automated analysis tasks.