-
Updated
Oct 2, 2020 - Python
#
dynamic-analysis
Here are 142 public repositories matching this topic...
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
python
rest
static-analysis
apk
owasp
dynamic-analysis
web-security
ipa
malware-analysis
mobsf
android-security
mobile-security
windows-mobile-security
ios-security
mobile-security-framework
api-testing
cwe
devsecops
cvssv2
runtime-security
Defund the Police.
list
awesome
static-analysis
chinese
dynamic-analysis
awesome-list
malware-analysis
chinese-translation
malware-research
threat-sharing
threatintel
malware-samples
analysis-framework
automated-analysis
network-traffic
threat-intelligence
domain-analysis
malware-collection
drop-ice
-
Updated
Oct 1, 2020
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
static-analysis
mobile-app
android-application
ios-app
dynamic-analysis
pentesting
reverse-engineers
network-analysis
runtime-analysis
-
Updated
Aug 30, 2020
Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)
-
Updated
Sep 22, 2020 - Java
Platform for Architecture-Neutral Dynamic Analysis
-
Updated
Oct 2, 2020 - C
Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)
-
Updated
Jul 30, 2020
Binary Analysis Platform
emulator
security
arm
mips
static-analysis
ocaml
reverse-engineering
disassembler
symbolic-execution
bap
x86
dynamic-analysis
binary-analysis
instruction-semantics
program-analysis
taint-analysis
powerpc
program-verification
lifter
-
Updated
Oct 3, 2020 - OCaml
Python antivirus evasion tool
-
Updated
Mar 20, 2020 - Python
Hand-crafted Frida examples
android
java
ios
objective-c
reverse-engineering
instrumentation
dynamic-analysis
java-native-interface
arm64
mobile-security
frida
aarch64
hooking
runtime-analysis
-
Updated
Sep 4, 2020 - JavaScript
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
security
static-code-analysis
penetration-testing
dynamic-analysis
application-security
wordpress-security
mobile-security
vulnerability-management
vulnerability-scanners
security-scanner
vulnerability-assessment
network-security
webappsec
vulnerability-scanning
source-code-analysis
penetration-testing-framework
security-vulnerability-assessment
-
Updated
Jul 1, 2020 - Java
monitor filesystem on iOS / OS X / Android / FirefoxOS / Linux
-
Updated
Jul 8, 2020 - C
HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis and security assessment on the Linux system.
-
Updated
Oct 13, 2019 - Python
A curated list of awesome symbolic execution resources including essential research papers, lectures, videos, and tools.
-
Updated
Jan 25, 2020
See where each character on the screen came from in code.
-
Updated
Sep 16, 2020 - JavaScript
Radare2 and Frida better together.
-
Updated
Oct 1, 2020 - JavaScript
History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)
timeline
history
symbolic-execution
dynamic-analysis
program-analysis
dynamic-symbolic-execution
concolic-execution
solving
concolic
-
Updated
Dec 30, 2017
Droidefense: Advance Android Malware Analysis Framework
android
security
static-code-analysis
engine
static-analysis
malware
trojan
dynamic-analysis
ransomware
reverse
opcodes
engineer
dalvik
malware-analysis
droidefense
dynamic-code-analysis
-
Updated
Sep 28, 2019 - Java
A hackable malware sandbox for the 21st Century
-
Updated
Oct 1, 2020 - Go
A dynamic analysis framework for WebAssembly programs.
-
Updated
Sep 15, 2020 - JavaScript
Project moved to: https://github.com/llvm/llvm-project
-
Updated
Oct 22, 2019 - C
mre
commented
Oct 1, 2020
We'd like to include the tools in this repository on our website for analysis tools.
To make this happen, the tools would have to be machine-readable.
The structure should be similar to the static-analysis repository.
As a first step, every tool has to be moved into a separate yml file in the
computer-science
open-source
regular-expression
test-automation
environment-variables
penetration-testing
dynamic-analysis
awesome-list
test-data
threat-hunting
html-entities
network-discovery
domain-name
information-security
password-cracker
security-tools
exploit-development
attack-modeling
dictionary-search
http-headers
-
Updated
Jul 1, 2019 - HTML
This repo aims at providing practical examples on how to use r2frida
-
Updated
May 19, 2019
Binary instrumentation framework based on FRIDA
malware
dynamic-analysis
malware-analysis
android-malware
malware-detection
android-malware-detection
frida-snippets
-
Updated
Oct 2, 2020 - Python
automatic program repair for Java with generate-and-validate techniques ✌️ ✌️ : jGenProg (2014) - jMutRepair (2016) - jKali (2016) - DeepRepair (2017) - Cardumen (2018) - 3sfix (2018)
-
Updated
Oct 3, 2020 - Java
The Redexer binary instrumentation framework for Dalvik bytecode
-
Updated
Sep 8, 2020 - OCaml
Dynamic definitions and types provider for ruby static analysis
-
Updated
Jan 14, 2020 - Kotlin
AirSpy - Frida-based tool for exploring and tracking the evolution of Apple's AirDrop protocol implementation on i/macOS, from the server's perspective. Released during BH USA 2019 Training https://www.nowsecure.com/event/advanced-frida-and-radare-a-hackers-delight/
-
Updated
Jul 31, 2020 - TypeScript
Improve this page
Add a description, image, and links to the dynamic-analysis topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the dynamic-analysis topic, visit your repo's landing page and select "manage topics."
Add 8.7 and 8.8 for android and ios: show how you can delay the attacker or report tampering to the backend as a response to a tamper detected
8.7: The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
8.8: The detection mechanisms trigger responses of different types, includ