dexmod is a tool written in python to exemplify patching Dalvik bytecode in a DEX (Dalvik Executable) file, and assist in the static analysis of Android applications. It allows researchers to: Find methods in the application based on bytecode patterns Add new strings to the application Patch methods with custom bytecode Download and Usage: Download the dexmod code, and modify the editBytecode.py skeleton code to include custom bytecode patching logic based on analyzed samples. Run the following command, where DEX_FILE_NAME is the name of the DEX file to be patched: python dexmod.py [DEX_FILE_NAME] The tool will generate a patched DEX file with the name
FEATURES
ALTERNATIVES
Detect and warn about potential malicious behaviors in Android applications through static analysis.
Verify scripts and executables to mitigate chain of supply attacks.
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.
A set of tools for securing JavaScript projects against software supply chain attacks.
A Graphical Realism Framework for Industrial Control Simulation organized as 5 VirtualBox VMs for realistic ICS network simulation.
NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.
An Android-based self-defense application against forensic imaging tools like Cellebrite UFED.
Tools and documentation for validating hardware security requirements on x86 platforms, including bootable USB key creation and platform configuration verification.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.