-
Updated
Aug 16, 2021 - Python
#
dynamic-analysis
Here are 170 public repositories matching this topic...
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
python
rest
static-analysis
apk
owasp
dynamic-analysis
web-security
malware-analysis
mobsf
android-security
mobile-security
windows-mobile-security
ios-security
mobile-security-framework
api-testing
cwe
devsecops
runtime-security
mstg
masvs
Defund the Police.
list
awesome
static-analysis
chinese
dynamic-analysis
awesome-list
malware-analysis
chinese-translation
malware-research
threat-sharing
threatintel
malware-samples
analysis-framework
automated-analysis
network-traffic
threat-intelligence
domain-analysis
malware-collection
drop-ice
-
Updated
Mar 18, 2021
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
static-analysis
mobile-app
android-application
ios-app
dynamic-analysis
pentesting
reverse-engineers
network-analysis
runtime-analysis
-
Updated
Feb 28, 2021
Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)
-
Updated
Sep 22, 2020 - Java
Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)
-
Updated
Mar 18, 2021
Platform for Architecture-Neutral Dynamic Analysis
-
Updated
Aug 19, 2021 - C
Automated code reviews via mutation testing - semantic code coverage.
ruby
coverage
mutation-testing
rspec
static-analysis
code-review
dynamic-analysis
mutant
minitest
code-quality-analyzer
static-anaysis
uncovered-semantics
-
Updated
Aug 2, 2021 - Ruby
Binary Analysis Platform
emulator
security
arm
mips
static-analysis
ocaml
reverse-engineering
disassembler
symbolic-execution
bap
x86
dynamic-analysis
binary-analysis
instruction-semantics
program-analysis
taint-analysis
powerpc
program-verification
lifter
-
Updated
Aug 14, 2021 - OCaml
Hand-crafted Frida examples
android
java
ios
objective-c
reverse-engineering
instrumentation
dynamic-analysis
java-native-interface
arm64
mobile-security
frida
aarch64
hooking
runtime-analysis
-
Updated
Jun 19, 2021 - JavaScript
Python antivirus evasion tool
-
Updated
Jan 26, 2021 - Python
A curated list of awesome symbolic execution resources including essential research papers, lectures, videos, and tools.
-
Updated
Mar 23, 2021
pschanely
commented
Jan 4, 2021
Today, many string methods cause symbolic strings to be "materialized" (the symbolic string becomes a concrete string and then gets handed to the native string implementation).
For some of these operations, this is likely the best we can do, but others may be implementable with the SMT solver directly. This is a list of those methods, and we'll check them off when we've decided that we have th
Radare2 and Frida better together.
-
Updated
Aug 19, 2021 - JavaScript
monitor filesystem on iOS / OS X / Android / FirefoxOS / Linux
-
Updated
Aug 4, 2021 - C
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
security
static-code-analysis
penetration-testing
dynamic-analysis
application-security
wordpress-security
mobile-security
vulnerability-management
vulnerability-scanners
security-scanner
vulnerability-assessment
network-security
webappsec
vulnerability-scanning
source-code-analysis
penetration-testing-framework
security-vulnerability-assessment
-
Updated
Jul 1, 2020 - Java
HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis and security assessment on the Linux system.
-
Updated
Oct 13, 2019 - Python
See where each character on the screen came from in code.
-
Updated
Aug 11, 2021 - JavaScript
Your performance & security consultant, an artisan command away.
-
Updated
Aug 8, 2021 - PHP
sandbox
static-analysis
malware
dynamic-analysis
antivirus
malware-analysis
portable-executable
security-tools
multiav
-
Updated
Aug 6, 2021 - Go
Binary instrumentation framework based on FRIDA
android
malware
medusa
dynamic-analysis
malware-analysis
frida
dexdump
android-malware
malware-detection
android-malware-detection
frida-snippets
frida-scripts
-
Updated
Jul 18, 2021 - Python
History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)
timeline
history
symbolic-execution
dynamic-analysis
program-analysis
dynamic-symbolic-execution
concolic-execution
solving
concolic
-
Updated
Dec 30, 2017
Droidefense: Advance Android Malware Analysis Framework
android
security
static-code-analysis
engine
static-analysis
malware
trojan
dynamic-analysis
ransomware
reverse
opcodes
engineer
dalvik
malware-analysis
droidefense
dynamic-code-analysis
-
Updated
Aug 13, 2021 - Java
A curated list of dynamic analysis tools for all programming languages, binaries, and more.
-
Updated
Aug 18, 2021 - Rust
A dynamic analysis framework for WebAssembly programs.
-
Updated
Feb 10, 2021 - JavaScript
Project moved to: https://github.com/llvm/llvm-project
-
Updated
Oct 22, 2019 - C
computer-science
open-source
regular-expression
test-automation
environment-variables
penetration-testing
dynamic-analysis
awesome-list
test-data
threat-hunting
html-entities
network-discovery
domain-name
information-security
password-cracker
security-tools
exploit-development
attack-modeling
dictionary-search
http-headers
-
Updated
Aug 14, 2021 - HTML
Python AV Evasion Tools
python
backdoor
reverse-shell
malware
injection
dynamic-analysis
pentest
evasion
msfvenom
pe-loader
privilege-escalation
bypass-antivirus
meterpreter
cobalt-strike
fud
metasploit
antivirus-evasion
redteam
undetectable
shellcode-injection
-
Updated
Aug 13, 2021 - Python
This repo aims at providing practical examples on how to use r2frida
-
Updated
Dec 11, 2020
Setup scripts for my Malware Analysis VMs
-
Updated
Aug 5, 2021 - PowerShell
Improve this page
Add a description, image, and links to the dynamic-analysis topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the dynamic-analysis topic, visit your repo's landing page and select "manage topics."
App Attest allows your app to attach a hardware-backed assertion as a part of the request. Your server can use assertion to verify the request came from your genuine app, on a genuine Apple device.
https://developer.apple.com/videos/play/wwdc2021/10244/
https://developer.apple.com/documentation/devicecheck/assessing_fraud_risk
https://developer.apple.com/documentation/bundleresources/entit