A tool to retrieve malware directly from the source for security researchers.
☆39May 10, 2017Updated 8 years ago
Alternatives and similar repositories for maltrieve
Users that are interested in maltrieve are comparing it to the libraries listed below
Sorting:
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Aug 7, 2015Updated 10 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆11May 29, 2019Updated 6 years ago
- A collection of malware that we use for testing and training☆12Nov 11, 2020Updated 5 years ago
- Unofficial mirror of☆11Feb 2, 2018Updated 8 years ago
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 4 years ago
- Lepus-CTF frontend application☆11Nov 2, 2015Updated 10 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- .netアプリケーションの関数を実行時に置き換えるプログラム☆15Jan 21, 2017Updated 9 years ago
- The Android Runtime Instrumentation Toolkit☆25Aug 20, 2016Updated 9 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- A Collection of Android Malware☆18Feb 19, 2019Updated 7 years ago
- Malware captured with honeypots☆38Oct 2, 2017Updated 8 years ago
- FRAC and RIFT☆17Mar 16, 2019Updated 7 years ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- A Multithread PcapNG capturing tool with Hardware timestamping☆10Nov 6, 2016Updated 9 years ago
- Sample Program for rust-uefi. It's running as a UEFI apps written by Rust.☆16Sep 14, 2019Updated 6 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Jul 27, 2017Updated 8 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- ☆17Jul 20, 2018Updated 7 years ago
- A set of Splunk workflow action definitions to export field values to CyberChef for further analysis.☆13Jan 22, 2018Updated 8 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 10 years ago
- A curated malware database with more then +73000 samples.☆20Feb 20, 2021Updated 5 years ago
- Makes files super hidden on NTFS☆19Aug 14, 2014Updated 11 years ago
- A collection of infosec related scripts and information.☆54Oct 2, 2024Updated last year
- scripts to setup servers, as quickly as possible☆10Mar 5, 2026Updated 2 weeks ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- ida for android☆26May 15, 2017Updated 8 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- A WIP IL2CPP metadata -> IDC generator☆10Feb 23, 2019Updated 7 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.