The Wayback Machine - https://web.archive.org/web/20220215033007/https://github.com/topics/malware-analysis
Skip to content
#

malware-analysis

Here are 834 public repositories matching this topic...

trufae
trufae commented Jan 21, 2022
[0x100001060]> pia 4
str z21, [x2, 0x4a, mul vl]
???
???
???
[0x100001060]> pia 8
str z21, [x2, 0x4a, mul vl]
???
???
???
invalid
???
???
???
[0x100001060]> p8 8
554889e541574156
[0x100001060]> e asm.arch;e asm.bits
arm
64
[0x100001060]>
Mobile-Security-Framework-MobSF

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

  • Updated Feb 14, 2022
  • JavaScript

GDA is a new fast and powerful decompiler in C++(working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, data decryption, and encryption, etc.

  • Updated Dec 29, 2021
  • Java
capa
williballenthin
williballenthin commented Jun 1, 2021

in some cases, f-strings can be easier for humans to read and result in fewer characters/lines. they are supported from py3.6 onwards, so they're now acceptable to use within capa.

we should use f-strings where they make sense. furthermore, we should define what "make sense" means.

notably, we should not use f-strings in calls to logging.

![image](https://user-images.githubusercontent

Improve this page

Add a description, image, and links to the malware-analysis topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the malware-analysis topic, visit your repo's landing page and select "manage topics."

Learn more