该仓库手机恶意软件源码,以不同编程语言、不同平台上实现
#Awesome#A curated list of awesome YARA rules, tools, and people.
翻译 - 精选的YARA规则,工具和人员的精选清单。
#安卓#Android Reverse-Engineering Workbench for VS Code
#安卓#Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
翻译 - 扫描所有正在运行的进程。识别并转储各种潜在的恶意植入(替换/植入的 PE、shellcode、挂钩、内存中的补丁)。
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with...
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.
a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containe...
Emotet detection tool for Windows OS
翻译 - Windows OS的Emotet检测工具
#安卓#APK/DEX detector for Windows, Linux and MacOS.
Linker/Compiler/Tool detector for Windows, Linux and MacOS.
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
FCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Drltrace is a library calls tracer for Windows and Linux applications.
An open source framework for enterprise level automated analysis.
#计算机科学#Awesome graph anomaly detection techniques built based on deep learning frameworks. Collections of commonly used datasets, papers as well as implementations are listed in this github repository. We al...
Collection of private Yara rules.