DroidAnalytics

Malware analyzer

An Android malware analysis system designed to collect and analyze malware signatures using machine learning techniques.

linux version (rewrite in Python)

GitHub

29 stars
8 watching
19 forks
Language: Python
last commit: over 9 years ago

Related projects:

Repository Description Stars
telekom-security/malware_analysis An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. 110
droidefense/engine An Android malware analysis framework that generates detailed reports on executable code behavior 473
maldroid/maldrolyzer A framework to analyze and extract data from Android malware, providing actionable information about malicious code. 102
udcide/udcide Tool for analyzing and modifying Android malware behaviors to aid in security analysis and investigation 34
uppusaikiran/generic-parser Analyzes malware files to detect suspicious behavior by extracting meta information and features. 1
cyb3rmx/qu1cksc0pe A comprehensive tool for analyzing suspicious files and detecting malware characteristics. 1,320
tomchop/malcom Analyzes network traffic to detect malware communication and behavior 1,155
idanr1986/cuckoo-droid Automated Android malware analysis tool using Cuckoo Sandbox 580
joxeankoret/pyew A command-line tool for analyzing malware and disassembling binary files 383
cristianzsh/freki A platform for analyzing malware and performing reverse engineering on binary files 422
rjzak/decompressingyara A tool for decompressing malware samples and running Yara rules against them. 7
tencent/habomalhunter Automates malware analysis on Linux systems to extract and analyze static and dynamic features 732
pjlantz/droidbox Analyzes Android app behavior to detect security vulnerabilities and malicious activities 758
areizen/android-malware-sandbox A tool designed to analyze and sandbox Android malware by injecting hooks into the application's behavior. 280
jpcertcc/aa-tools A collection of tools and scripts for analyzing malware, reverse engineering malware, and decrypting encrypted data 455