This is part of a module for the framework that i'm constantly developing.
Robots images are provided by robohash.org
Flag icons are provided by famfamfam
The decoders were mostly making use of Androguard to extract the C2 or malware authors' credentials
One of the decoder is making use of LIEF to extract the C2 from the android malware samples.
One of the decoder, Anubis, is contributed by @eybisi It's pretty good.
Currently, there are 239 configs extracted from Android Malware.
The data is accurate as of 18th February 2019.