InQuest / malware-samples
A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
☆909Updated last year
Alternatives and similar repositories for malware-samples:
Users that are interested in malware-samples are comparing it to the libraries listed below
- Malware sample library.☆570Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,544Updated last year
- Bringing you the best of the worst files on the Internet.☆324Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆706Updated 2 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,149Updated this week
- A collection of malware samples caught by several honeypots i manage☆1,679Updated 3 years ago
- yarGen is a generator for YARA rules☆1,626Updated 2 weeks ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,051Updated last week
- Indicators of Compromises (IOC) of our various investigations☆1,758Updated last week
- Repository of YARA rules made by Trellix ATR Team☆592Updated last month
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,120Updated this week
- Malware Configuration And Payload Extraction☆754Updated 5 months ago
- Indicators from Unit 42 Public Reports☆710Updated 2 weeks ago
- ReversingLabs YARA Rules☆814Updated last week
- Malware Configuration And Payload Extraction☆2,347Updated last week
- Sophos-originated indicators-of-compromise from published reports☆578Updated 3 weeks ago
- A not so awesome list of malware gems for aspiring malware analysts☆804Updated 2 years ago
- MBC content in markdown☆432Updated 2 weeks ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,568Updated last year
- Volatility plugin for extracts configuration data of known malware☆486Updated last year
- Online hash checker for Virustotal and other services☆824Updated last month
- FAME Automates Malware Evaluation☆890Updated last week
- YARA signature and IOC database for my scanners and tools☆2,596Updated this week
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆574Updated 3 weeks ago
- Malware Sample Sources☆560Updated 4 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆374Updated 2 years ago
- A collection of sources of indicators of compromise.☆850Updated 6 months ago
- malware source codes☆550Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆578Updated 11 months ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆558Updated last week