The Kharon project aims to discover, understand, characterize, and detect Android malware through the study of Information Flow monitoring techniques. It includes behavioral signatures of malware, the Kharon16 malware dataset, and the GroddDroid tool for stimulating and triggering malware.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A powerful tool for detecting and identifying malware using a rule-based system.
Multi-cloud antivirus scanning API with CLAMAV and YARA support for AWS S3, Azure Blob Storage, and GCP Cloud Storage.
A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.
Krakatau provides an assembler and disassembler for Java bytecode, supporting conversion, creation, examination, comparison, and decompilation of Java binaries.
A semi-automatic tool to generate YARA rules from virus samples.
A tool designed to handle archive file data and augment Yara's capabilities.
A project providing open-source YARA rules for malware and malicious file detection
A .NET wrapper for libyara that provides a simplified API for developing tools in C# and PowerShell.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.