{"id":1240,"date":"2018-05-14T13:03:40","date_gmt":"2018-05-14T07:33:40","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=1240"},"modified":"2018-05-14T13:03:40","modified_gmt":"2018-05-14T07:33:40","slug":"hooker","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/hooker\/","title":{"rendered":"Hooker : Automated Dynamic Analysis of Android Applications"},"content":{"rendered":"<p>Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently capture and adjust any API calls made by a targeted application.<\/p>\n<p>It use Android Substrate system to catch these calls and total all their relevant data (parameters, returned values, &#8230;). Gathered data can either be put away in an ElasticSearch or in JSON records.<\/p>\n<p>An arrangement of python scripts is additionally given to automatize the execution of an examination to gather any API calls made by a set of applications.<\/p>\n<h4><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span>\u00a0<a href=\"https:\/\/kalilinuxtutorials.com\/instagram-py-python-script\/\" target=\"_blank\" rel=\"noopener\">Instagram-Py \u2013 Python Script To Brute Force Attack<\/a><\/strong><\/h4>\n<p>Android-Hooker is a proof of idea depending on the Substrate system. That implies Hooker can&#8217;t work if Substrate isn&#8217;t accurately introduced on your device. For the occasion, the creators have effectively introduced Substrate on gadgets with Android variants 4.1 and 4.2.<\/p>\n<h2><span style=\"color: #008080;\"><strong>Hooker Technical Description<\/strong><\/span><\/h2>\n<p>Hooker is made of multiple modules:<\/p>\n<ol>\n<li><strong>APK-instrumenter<\/strong> is an Android application that must be installed prior to the analysis on an Android device (for instance, an emulator).<\/li>\n<li><strong>hooker_xp<\/strong> is a python tool that can be use to control the android device and trigger the installation and stimulation of an application on it.<\/li>\n<li><strong>hooker_analysis<\/strong> is a python script that can be use to collect results stored in the elasticsearch database.<\/li>\n<li><strong>tools\/APK-contactGenerator<\/strong> is an Android application that is automatically installed on the Android device by hooker_xp to inject fake contact informations.<\/li>\n<li><strong>tools\/apk_retriever<\/strong> is a Python tool that can be use to download APKs from various online public Android markets.<\/li>\n<li><strong>tools\/emulatorCreator<\/strong> is a collection of scripts that can be use to prepare an emulator.<\/li>\n<\/ol>\n<p><a href=\"https:\/\/github.com\/AndroidHooker\/hooker\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-999\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" alt=\"\" width=\"141\" height=\"40\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently capture and adjust any API calls made by a targeted application. It use Android Substrate system to catch these calls and total all their relevant data (parameters, returned values, &#8230;). Gathered [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[156,1533],"class_list":["post-1240","post","type-post","status-publish","format-standard","hentry","category-kali","tag-android","tag-hooker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hooker : Automated Dynamic Analysis of Android Applications<\/title>\n<meta name=\"description\" content=\"Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently capture and adjust any API calls made by a targeted application\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/hooker\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hooker : Automated Dynamic Analysis of Android Applications\" \/>\n<meta property=\"og:description\" content=\"Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently capture and adjust any API calls made by a targeted application\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/hooker\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-14T07:33:40+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hooker\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hooker\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Hooker : Automated Dynamic Analysis of Android Applications\",\"datePublished\":\"2018-05-14T07:33:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hooker\/\"},\"wordCount\":281,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hooker\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"keywords\":[\"android\",\"Hooker\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hooker\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/hooker\/\",\"name\":\"Hooker : Automated Dynamic Analysis of Android Applications\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hooker\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hooker\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"datePublished\":\"2018-05-14T07:33:40+00:00\",\"description\":\"Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently capture and adjust any API calls made by a targeted application\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/hooker\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hooker\/#primaryimage\",\"url\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"contentUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hooker : Automated Dynamic Analysis of Android Applications","description":"Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently capture and adjust any API calls made by a targeted application","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/hooker\/","og_locale":"en_US","og_type":"article","og_title":"Hooker : Automated Dynamic Analysis of Android Applications","og_description":"Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently capture and adjust any API calls made by a targeted application","og_url":"https:\/\/kalilinuxtutorials.com\/hooker\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-05-14T07:33:40+00:00","og_image":[{"url":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/hooker\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/hooker\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Hooker : Automated Dynamic Analysis of Android Applications","datePublished":"2018-05-14T07:33:40+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/hooker\/"},"wordCount":281,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/hooker\/#primaryimage"},"thumbnailUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","keywords":["android","Hooker"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/hooker\/","url":"https:\/\/kalilinuxtutorials.com\/hooker\/","name":"Hooker : Automated Dynamic Analysis of Android Applications","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/hooker\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/hooker\/#primaryimage"},"thumbnailUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","datePublished":"2018-05-14T07:33:40+00:00","description":"Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently capture and adjust any API calls made by a targeted application","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/hooker\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/hooker\/#primaryimage","url":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","contentUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1748,"url":"https:\/\/kalilinuxtutorials.com\/introspy-security-profiling\/","url_meta":{"origin":1240,"position":0},"title":"Introspy &#8211; Security Profiling For Blackbox iOS","author":"R K","date":"June 26, 2018","format":false,"excerpt":"Introspy is a Blackbox tool to help understand what an iOS application is doing at runtime and assist in the identification of potential security issues. Introduction to Introspy tool This is the repository for the Introspy-iOS tracer. The tracer can be installed on a jailbroken device to hook and log\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1268,"url":"https:\/\/kalilinuxtutorials.com\/vayne-rat-free-tool\/","url_meta":{"origin":1240,"position":1},"title":"Vayne-RaT  Free and Open Source Remote Administration","author":"Linumonk","date":"May 14, 2018","format":false,"excerpt":"Vayne-RaT is Free and Open Source Remote Administration Tool Coded In C#. Android has emerged because the high mobile software package, we've seen a good rise within the automaton hacking apps for unmoving yet as non-rooted devices. For our readers, we've read the list of the most effective hacking apps\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/crypter-1024x351.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/crypter-1024x351.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/crypter-1024x351.jpg?resize=525%2C300 1.5x"},"classes":[]},{"id":36563,"url":"https:\/\/kalilinuxtutorials.com\/medusa\/","url_meta":{"origin":1240,"position":2},"title":"MEDUSA : A Comprehensive Framework For Dynamic Mobile Application Analysis","author":"Varshini","date":"February 19, 2025","format":false,"excerpt":"MEDUSA is an extensible and modularized framework designed to automate dynamic analysis processes for Android and iOS applications. Built on the FRIDA instrumentation toolkit, MEDUSA provides a wide range of tools to enhance penetration testing, malware analysis, and application security reviews. Key Features Extensive Module Library: Over 90 modules tailored\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MEDUSA-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MEDUSA-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MEDUSA-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MEDUSA-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MEDUSA-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MEDUSA-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":29044,"url":"https:\/\/kalilinuxtutorials.com\/quadrainspect\/","url_meta":{"origin":1240,"position":3},"title":"QuadraInspect : Android Framework Providing A Powerful Tool For Analyzing The Security Of Android Applications","author":"R K","date":"May 30, 2023","format":false,"excerpt":"QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security of Android applications. The security of mobile devices has become a critical concern due to the increasing amount of sensitive data being stored on them. With the rise of Android OS\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiN9jR2ypiZITpxkWzTjJFSNbpIbjTttDm7U4Ynx8b7zQjJfRbnXjOJJ_eR_djiOHWq3Q0LKvZFJ811E_gv7S9lnMR-MxkO1SpmsicsmMv3NwrNqYsknIpJ7nSchOkzxj1W2t73IvwtRHLB-B0Paup2ujg4iQ0vOlkMMOXsYedv0C2MrdK0h1w_V5-q\/s16000\/quadra%20img.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiN9jR2ypiZITpxkWzTjJFSNbpIbjTttDm7U4Ynx8b7zQjJfRbnXjOJJ_eR_djiOHWq3Q0LKvZFJ811E_gv7S9lnMR-MxkO1SpmsicsmMv3NwrNqYsknIpJ7nSchOkzxj1W2t73IvwtRHLB-B0Paup2ujg4iQ0vOlkMMOXsYedv0C2MrdK0h1w_V5-q\/s16000\/quadra%20img.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiN9jR2ypiZITpxkWzTjJFSNbpIbjTttDm7U4Ynx8b7zQjJfRbnXjOJJ_eR_djiOHWq3Q0LKvZFJ811E_gv7S9lnMR-MxkO1SpmsicsmMv3NwrNqYsknIpJ7nSchOkzxj1W2t73IvwtRHLB-B0Paup2ujg4iQ0vOlkMMOXsYedv0C2MrdK0h1w_V5-q\/s16000\/quadra%20img.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiN9jR2ypiZITpxkWzTjJFSNbpIbjTttDm7U4Ynx8b7zQjJfRbnXjOJJ_eR_djiOHWq3Q0LKvZFJ811E_gv7S9lnMR-MxkO1SpmsicsmMv3NwrNqYsknIpJ7nSchOkzxj1W2t73IvwtRHLB-B0Paup2ujg4iQ0vOlkMMOXsYedv0C2MrdK0h1w_V5-q\/s16000\/quadra%20img.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":31499,"url":"https:\/\/kalilinuxtutorials.com\/py-amsi\/","url_meta":{"origin":1240,"position":4},"title":"py-amsi: Streamlining Malware Detection in Python with the Windows AMSI API","author":"Varshini","date":"December 11, 2023","format":false,"excerpt":"py-amsi is a library that scans strings or files for malware using the Windows Antimalware Scan Interface (AMSI) API. AMSI is an interface native to Windows that allows applications to ask the antivirus installed on the system to analyse a file\/string. AMSI is not tied to Windows Defender. Antivirus providers\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEivkMOWSsSpwk_3O7Hbmhq_gOJQVP5bYsoTG-Cs4RGfwq5P7k8eNxrzCY3qrcz79FW09emkdwLD1umdrc8NjfSOQdFWBEM1vT75Uv0kzqIp3HQE-X7BDxHyy-fKxi_Y03vPZ684AhnMqm5x1Uq_-uBjeoCjlKAtizKply6UkNPBnDf7N0GBCUzp0-rwvg\/s16000\/py-amsi.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEivkMOWSsSpwk_3O7Hbmhq_gOJQVP5bYsoTG-Cs4RGfwq5P7k8eNxrzCY3qrcz79FW09emkdwLD1umdrc8NjfSOQdFWBEM1vT75Uv0kzqIp3HQE-X7BDxHyy-fKxi_Y03vPZ684AhnMqm5x1Uq_-uBjeoCjlKAtizKply6UkNPBnDf7N0GBCUzp0-rwvg\/s16000\/py-amsi.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEivkMOWSsSpwk_3O7Hbmhq_gOJQVP5bYsoTG-Cs4RGfwq5P7k8eNxrzCY3qrcz79FW09emkdwLD1umdrc8NjfSOQdFWBEM1vT75Uv0kzqIp3HQE-X7BDxHyy-fKxi_Y03vPZ684AhnMqm5x1Uq_-uBjeoCjlKAtizKply6UkNPBnDf7N0GBCUzp0-rwvg\/s16000\/py-amsi.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEivkMOWSsSpwk_3O7Hbmhq_gOJQVP5bYsoTG-Cs4RGfwq5P7k8eNxrzCY3qrcz79FW09emkdwLD1umdrc8NjfSOQdFWBEM1vT75Uv0kzqIp3HQE-X7BDxHyy-fKxi_Y03vPZ684AhnMqm5x1Uq_-uBjeoCjlKAtizKply6UkNPBnDf7N0GBCUzp0-rwvg\/s16000\/py-amsi.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":2634,"url":"https:\/\/kalilinuxtutorials.com\/mobsf-mobile-security-framework\/","url_meta":{"origin":1240,"position":5},"title":"MobSF &#8211; Mobile Security Framework Is An Automated All-In-One Mobile Application","author":"R K","date":"September 17, 2018","format":false,"excerpt":"Mobile Security Framework or MobSF is an automated, all-in-one mobile application (Android\/iOS\/Windows) pen-testing framework capable of performing static, dynamic and malware analysis. It can be used for effective and fast security analysis of Android, iOS and Windows mobile applications and support both binaries (APK, IPA & APPX ) and zipped\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/MobSF1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/MobSF1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/MobSF1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/MobSF1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/MobSF1.png?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/1240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=1240"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/1240\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=1240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=1240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=1240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}