Home

Awesome

MalConfig

This is part of a module for the framework that i'm constantly developing.

Robots images are provided by robohash.org

Flag icons are provided by famfamfam

The decoders were mostly making use of Androguard to extract the C2 or malware authors' credentials

One of the decoder is making use of LIEF to extract the C2 from the android malware samples.

One of the decoder, Anubis, is contributed by @eybisi It's pretty good.

Currently, there are 239 configs extracted from Android Malware.

The data is accurate as of 18th February 2019.