Course materials for Malware Analysis by RPISEC
☆4,023Aug 26, 2022Updated 3 years ago
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Course materials for Modern Binary Exploitation by RPISEC☆5,973Dec 9, 2021Updated 4 years ago
- Defund the Police.☆13,769Jun 7, 2024Updated last year
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆13,014Apr 1, 2026Updated last month
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,165Apr 14, 2025Updated last year
- malware source codes☆579Dec 16, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆4,025Updated this week
- A repository for learning various heap exploitation techniques.☆8,650May 15, 2026Updated last week
- A curated list of awesome reversing resources☆4,491Aug 19, 2023Updated 2 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆239Mar 6, 2025Updated last year
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,679Apr 28, 2026Updated 3 weeks ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆905Feb 25, 2020Updated 6 years ago
- A curated list of tools for incident response☆9,039May 6, 2026Updated 2 weeks ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆3,002Feb 24, 2025Updated last year
- List of awesome reverse engineering resources☆10,085Jul 29, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Wiki to collect Red Team infrastructure hardening resources☆4,480Oct 1, 2025Updated 7 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- A collection of resources for linux reverse engineering☆2,076Jun 2, 2022Updated 3 years ago
- Binary analysis and management framework☆1,562Jun 7, 2023Updated 2 years ago
- CTF framework and exploit development library☆13,446May 14, 2026Updated last week
- Malcom - Malware Communications Analyzer☆1,168Nov 29, 2017Updated 8 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,267Mar 26, 2026Updated last month
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,813Apr 3, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A static analyzer for PE executables.☆1,125Mar 11, 2026Updated 2 months ago
- Various public documents, whitepapers and articles about APT campaigns☆3,652Jan 1, 2024Updated 2 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,125Apr 2, 2026Updated last month
- A collected list of awesome security talks☆4,211Feb 17, 2026Updated 3 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,955May 3, 2022Updated 4 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,167Nov 14, 2020Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,962Apr 1, 2026Updated last month
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,070Aug 31, 2021Updated 4 years ago
- A Course on Intermediate Level Linux Exploitation☆1,015Aug 24, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Materials for Windows Malware Analysis training (volume 1)☆2,076Jul 1, 2024Updated last year
- A collection of links related to Linux kernel security and exploitation☆6,459Updated this week
- Malware samples, analysis exercises and other interesting resources.☆1,635Jan 13, 2024Updated 2 years ago
- PEDA - Python Exploit Development Assistance for GDB☆6,117Jul 29, 2024Updated last year
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,000Aug 27, 2022Updated 3 years ago
- Repository of yara rules☆4,799Apr 17, 2024Updated 2 years ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,945Oct 20, 2025Updated 7 months ago