Androguard (Android Guard) is a tool written in python to play with .class, .dex, APK, JAR, and Android's binary XML files. It allows you to perform diffing of Android applications, measure similarities, check if it is malware, and more.
671b0498a2bebd683915cddf16a334e324cc6f8731c4b22a77266798a3908a13
ISTAR is a set of python code that performs various functions including use of ptrace to simulate a userland rootkit.
3bb7022c0e550e915f5519e4b603de58dd1f094954e4b0c4b1307ece8b015b34
Sanson the Headman is a tool for automating remote userland execve (ELF format).
afd6a20a79c138a626eb979268c947be8661612dd558e15f548a1551964adc3f
Draugr is a simple tool to play with /dev/(k)mem or a file memory dump. It can find kernel symbols (pattern matching in a XML file or with EXPORT_SYMBOL), processes (informations and sections) (by the kernel linked list or bruteforce) and disassemble/dump the memory.
7f05f91291f17eb7ad2ce990693d584328ad80612bd8147b2363c55411cb34d1