InQuest / malware-samples
A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
☆885Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for malware-samples
- Malware sample library.☆558Updated 11 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆704Updated last year
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,120Updated 11 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,478Updated 10 months ago
- A collection of malware samples caught by several honeypots i manage☆1,626Updated 3 years ago
- yarGen is a generator for YARA rules☆1,557Updated 5 months ago
- Repository of YARA rules made by Trellix ATR Team☆570Updated 11 months ago
- ReversingLabs YARA Rules☆769Updated last month
- Malware Configuration And Payload Extraction☆747Updated 2 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,648Updated last week
- Indicators from Unit 42 Public Reports☆702Updated last month
- Bringing you the best of the worst files on the Internet.☆298Updated 3 years ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆531Updated this week
- A toolset to make a system look as if it was the victim of an APT attack☆2,470Updated last year
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆363Updated 2 years ago
- ☆1,051Updated 5 years ago
- FAME Automates Malware Evaluation☆862Updated this week
- YARA signature and IOC database for my scanners and tools☆2,486Updated this week
- Digital Forensics artifact repository☆1,063Updated 3 months ago
- YARA Rules I come across on the internet☆334Updated 7 months ago
- Online hash checker for Virustotal and other services☆809Updated 6 months ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆997Updated 8 months ago
- Sophos-originated indicators-of-compromise from published reports☆545Updated 2 weeks ago
- A collection of resources for Threat Hunters☆855Updated last month
- MBC content in markdown☆375Updated this week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,804Updated this week
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆572Updated 6 months ago
- A collection of sources of indicators of compromise.☆806Updated last month
- Volatility plugin for extracts configuration data of known malware☆485Updated 10 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,247Updated 4 years ago