Skip to content
#

malware-analysis

Here are 735 public repositories matching this topic...

swoops
swoops commented Aug 19, 2021

Description

Please describe what are you missing or wanting to be improved
Recently I read a new syntax coloring technique for programing languages. Instead of highlighting grammar, highlight the things you are likely to mistake. So make sure strcpy and strncpy are easily distinguishable by their color. It would be cool to apply this to immediate values in assembly and the ? command

Mobile-Security-Framework-MobSF

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

  • Updated Aug 27, 2021
  • Python

GDA is a new fast and powerful decompiler in C++(working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, data decryption, and encryption, etc.

  • Updated Aug 24, 2021
  • Java
capa
williballenthin
williballenthin commented Jun 1, 2021

in some cases, f-strings can be easier for humans to read and result in fewer characters/lines. they are supported from py3.6 onwards, so they're now acceptable to use within capa.

we should use f-strings where they make sense. furthermore, we should define what "make sense" means.

notably, we should not use f-strings in calls to logging.

![image](https://user-images.githubusercontent

Improve this page

Add a description, image, and links to the malware-analysis topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the malware-analysis topic, visit your repo's landing page and select "manage topics."

Learn more