0x4143 / malware-gemsView external linksLinks
A not so awesome list of malware gems for aspiring malware analysts
☆829Feb 7, 2023Updated 3 years ago
Alternatives and similar repositories for malware-gems
Users that are interested in malware-gems are comparing it to the libraries listed below
Sorting:
- Materials for Windows Malware Analysis training (volume 1)☆2,024Jul 1, 2024Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,612Jan 13, 2024Updated 2 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆933Jun 3, 2024Updated last year
- Resources for Windows exploit development☆1,648Dec 20, 2021Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,531Jan 20, 2026Updated 3 weeks ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆753Nov 16, 2021Updated 4 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,813Feb 5, 2026Updated last week
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆587May 5, 2024Updated last year
- Quickly debug shellcode extracted during malware analysis☆625May 23, 2023Updated 2 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,338Dec 23, 2025Updated last month
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,877Feb 3, 2026Updated last week
- Dynamic unpacker based on PE-sieve☆796Sep 13, 2025Updated 5 months ago
- ☆2,169Feb 21, 2023Updated 2 years ago
- Defund the Police.☆13,426Jun 7, 2024Updated last year
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,159Nov 14, 2020Updated 5 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,889Updated this week
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,502Oct 8, 2025Updated 4 months ago
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆684Jul 6, 2024Updated last year
- Everything related to Linux Forensics☆719Jul 13, 2023Updated 2 years ago
- Different learning materials☆229Sep 19, 2025Updated 4 months ago
- Windows Events Attack Samples☆2,502Jan 24, 2023Updated 3 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,550Oct 31, 2025Updated 3 months ago
- Research code & papers from members of vx-underground.☆1,351Dec 7, 2021Updated 4 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆861Jan 20, 2022Updated 4 years ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆930Mar 26, 2024Updated last year
- Organized list of my malware development resources☆1,700May 16, 2022Updated 3 years ago
- Course materials for Malware Analysis by RPISEC☆3,998Aug 26, 2022Updated 3 years ago
- A workshop about Malware Development☆1,759Jun 2, 2023Updated 2 years ago
- ☆1,071May 18, 2024Updated last year
- Windows kernel and user mode emulation.☆1,837Feb 4, 2026Updated last week
- A Binary Genetic Traits Lexer Framework☆522Aug 14, 2025Updated 6 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,310Oct 31, 2025Updated 3 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Dec 3, 2025Updated 2 months ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Oct 26, 2022Updated 3 years ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆645Nov 7, 2025Updated 3 months ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆780Feb 3, 2023Updated 3 years ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,828Mar 8, 2021Updated 4 years ago