Break Apps with Frida workshop material
A utility for automating the testing and re-signing of Express.js cookie secrets.
Opcode sequences extracted from BIG2015 dataset
- cookie-monster Public
Dec 10, 2022
- Android-InsecureBankv2 Public
Vulnerable Android application for developers and security enthusiasts to learn about Android insecurities
- RAPTOR-classification Public
The classification process used for malware classification based on feature sets
- RAPTOR-clustering-tools Public
Set of general tools used to perform classification from a clustering model
- RAPTOR-feature-engineering Public
The feature engineering process used reduced opcode sequences to feature sets
- RAPTOR-data-mining Public
The data mining process used to extract opcode sequences from datasets of malware sample binaries
- RAPTOR-dataset-VXAPT Public
Opcode sequences extracted from 'vx-underground' APT collections: https://vx-underground.org/apts.html
- RAPTOR-dataset-VTAPT Public
Opcode sequences extracted from an original dataset, raw samples cannot be shared due to VirusTotal user agreement.
This organization has no public members. You must be a member to see who’s a part of this organization.
Most used topics