A not so awesome list of malware gems for aspiring malware analysts
☆830Feb 7, 2023Updated 3 years ago
Alternatives and similar repositories for malware-gems
Users that are interested in malware-gems are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Materials for Windows Malware Analysis training (volume 1)☆2,027Jul 1, 2024Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,623Jan 13, 2024Updated 2 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆940Jun 3, 2024Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- Resources for Windows exploit development☆1,651Dec 20, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,715Mar 21, 2026Updated last week
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,910Updated this week
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆756Nov 16, 2021Updated 4 years ago
- Defund the Police.☆13,538Jun 7, 2024Updated last year
- Quickly debug shellcode extracted during malware analysis☆629May 23, 2023Updated 2 years ago
- ☆2,173Feb 21, 2023Updated 3 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,454Mar 20, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,537Feb 20, 2026Updated last month
- Dynamic unpacker based on PE-sieve☆799Sep 13, 2025Updated 6 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,936Updated this week
- Interesting APT Report Collection And Some Special IOCs☆2,956Updated this week
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆686Jul 6, 2024Updated last year
- Different learning materials☆231Sep 19, 2025Updated 6 months ago
- APT & CyberCriminal Campaign Collection☆4,053Jul 25, 2024Updated last year
- Course materials for Malware Analysis by RPISEC☆4,004Aug 26, 2022Updated 3 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,162Nov 14, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,323Oct 31, 2025Updated 4 months ago
- Windows Events Attack Samples☆2,531Jan 24, 2023Updated 3 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,583Updated this week
- A list of cyber-chef recipes and curated links☆2,197Jun 14, 2024Updated last year
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆933Mar 26, 2024Updated 2 years ago
- Organized list of my malware development resources☆1,703May 16, 2022Updated 3 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Everything related to Linux Forensics☆718Jul 13, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Windows kernel and user mode emulation.☆1,906Updated this week
- ☆1,074May 18, 2024Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 3 months ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,847Mar 8, 2021Updated 5 years ago
- A curated list of awesome resources related to executable packing☆1,550Feb 14, 2026Updated last month
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago