Collection of resources that are made by the Malware Research community
☆239Jun 17, 2023Updated 2 years ago
Alternatives and similar repositories for Resources
Users that are interested in Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆66Jan 27, 2023Updated 3 years ago
- ☆138Apr 20, 2023Updated 3 years ago
- My Malware Analysis Reports☆25May 24, 2022Updated 3 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A not so awesome list of malware gems for aspiring malware analysts☆830Feb 7, 2023Updated 3 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆83May 12, 2022Updated 3 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- ☆1,075May 18, 2024Updated last year
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated 4 months ago
- Resources for Windows exploit development☆1,654Dec 20, 2021Updated 4 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,633Jan 13, 2024Updated 2 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,038Jul 1, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A workshop about Malware Development☆1,779Jun 2, 2023Updated 2 years ago
- Yara Rules for Modern Malware☆80Mar 3, 2024Updated 2 years ago
- IoC Feed for security analysts etc.☆13Feb 1, 2023Updated 3 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,820Apr 16, 2026Updated 3 weeks ago
- ☆18Apr 4, 2019Updated 7 years ago
- Organized list of my malware development resources☆1,725Apr 1, 2026Updated last month
- A Binary Genetic Traits Lexer Framework☆568Updated this week
- Polymorphic code obfuscator for use in Red Team operations☆33Apr 13, 2022Updated 4 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Nov 25, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A solution to create obfuscated download cradles for PowerShell.☆16Aug 1, 2022Updated 3 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Different learning materials☆231Sep 19, 2025Updated 7 months ago
- ☆28Feb 7, 2021Updated 5 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Sep 22, 2023Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆97Aug 16, 2023Updated 2 years ago
- ☆84Nov 21, 2024Updated last year
- Some of my publicly available Malware analysis and Reverse engineering.☆949Jun 3, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆508Oct 7, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,255Mar 28, 2025Updated last year
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 8 months ago
- This repository contains zip archives of pcaps for our Wireshark tutorial about examining Emotet infection traffic. The password for any …☆25Jan 11, 2021Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆257Oct 29, 2025Updated 6 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago