Some of my publicly available Malware analysis and Reverse engineering.
☆952Jun 3, 2024Updated last year
Alternatives and similar repositories for Malware-analysis-and-Reverse-engineering
Users that are interested in Malware-analysis-and-Reverse-engineering are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Materials for Windows Malware Analysis training (volume 1)☆2,076Jul 1, 2024Updated last year
- A Pin Tool for tracing API calls etc☆1,657Feb 8, 2026Updated 3 months ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- Dynamic unpacker based on PE-sieve☆813Apr 14, 2026Updated last month
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,665May 3, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Malware samples, analysis exercises and other interesting resources.☆1,635Jan 13, 2024Updated 2 years ago
- Resources for Windows exploit development☆1,654Dec 20, 2021Updated 4 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆863Feb 2, 2024Updated 2 years ago
- HashDB API hash lookup plugin for IDA Pro☆358May 5, 2026Updated 2 weeks ago
- Windows kernel and user mode emulation.☆1,967Updated this week
- ☆2,187Apr 3, 2026Updated last month
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,352Apr 18, 2026Updated last month
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆760Nov 16, 2021Updated 4 years ago
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,558Feb 20, 2026Updated 3 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A curated list of awesome resources related to executable packing☆1,580Feb 14, 2026Updated 3 months ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,167Nov 14, 2020Updated 5 years ago
- Assortment of hashing algorithms used in malware☆398Feb 8, 2026Updated 3 months ago
- Quickly debug shellcode extracted during malware analysis☆636May 23, 2023Updated 3 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆831Feb 7, 2023Updated 3 years ago
- Workshop Material on VM-based Deobfuscation☆204Oct 20, 2021Updated 4 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆586May 5, 2024Updated 2 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,822Apr 16, 2026Updated last month
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆584Mar 8, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆77Nov 30, 2023Updated 2 years ago
- MalUnpack companion driver☆97Jun 17, 2024Updated last year
- Yet another variant of Process Hollowing☆468Jul 31, 2025Updated 9 months ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,962Apr 1, 2026Updated last month
- ☆32Apr 24, 2022Updated 4 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆175Updated this week
- Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM.☆1,438Jun 11, 2022Updated 3 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆4,025Updated this week
- A Binary Genetic Traits Lexer Framework☆583May 14, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Reverse Engineer's Toolkit☆5,199May 16, 2026Updated last week
- ☆119Aug 7, 2022Updated 3 years ago
- ☆779Oct 17, 2023Updated 2 years ago
- A Trace Explorer for Reverse Engineers☆1,538Oct 23, 2023Updated 2 years ago
- Inject .NET assemblies into an existing process☆506Jan 19, 2022Updated 4 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,679Apr 28, 2026Updated 3 weeks ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆3,002Feb 24, 2025Updated last year