Skip to content

jacobsoo/MalConfig

Repository files navigation

MalConfig

This is part of a module for the framework that i'm constantly developing.

Robots images are provided by robohash.org

Flag icons are provided by famfamfam

The decoders were mostly making use of Androguard to extract the C2 or malware authors' credentials

One of the decoder is making use of LIEF to extract the C2 from the android malware samples.

One of the decoder, Anubis, is contributed by @eybisi It's pretty good.

Currently, there are 239 configs extracted from Android Malware.

The data is accurate as of 18th February 2019.

About

This is part of a module for the framework that i'm constantly developing. Currently only information of the C2 are disclosed here.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages