Course materials for Malware Analysis by RPISEC
☆4,008Aug 26, 2022Updated 3 years ago
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Course materials for Modern Binary Exploitation by RPISEC☆5,962Dec 9, 2021Updated 4 years ago
- Defund the Police.☆13,587Jun 7, 2024Updated last year
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,895Apr 1, 2026Updated last week
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,158Apr 14, 2025Updated 11 months ago
- malware source codes☆572Dec 16, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,959Apr 2, 2026Updated last week
- A repository for learning various heap exploitation techniques.☆8,583Mar 26, 2026Updated 2 weeks ago
- A curated list of awesome reversing resources☆4,479Aug 19, 2023Updated 2 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆237Mar 6, 2025Updated last year
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,517Mar 20, 2026Updated 3 weeks ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆905Feb 25, 2020Updated 6 years ago
- A curated list of tools for incident response☆8,931Jul 18, 2024Updated last year
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,986Feb 24, 2025Updated last year
- List of awesome reverse engineering resources☆10,014Jul 29, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Wiki to collect Red Team infrastructure hardening resources☆4,467Oct 1, 2025Updated 6 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 3 months ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,043Aug 23, 2021Updated 4 years ago
- A collection of resources for linux reverse engineering☆2,079Jun 2, 2022Updated 3 years ago
- Binary analysis and management framework☆1,556Jun 7, 2023Updated 2 years ago
- CTF framework and exploit development library☆13,353Updated this week
- Malcom - Malware Communications Analyzer☆1,169Nov 29, 2017Updated 8 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,256Mar 26, 2026Updated 2 weeks ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,792Apr 3, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A static analyzer for PE executables.☆1,117Mar 11, 2026Updated last month
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,106Apr 2, 2026Updated last week
- Various public documents, whitepapers and articles about APT campaigns☆3,643Jan 1, 2024Updated 2 years ago
- A collected list of awesome security talks☆4,205Feb 17, 2026Updated last month
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,944May 3, 2022Updated 3 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,164Nov 14, 2020Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,905Apr 1, 2026Updated last week
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,065Aug 31, 2021Updated 4 years ago
- A Course on Intermediate Level Linux Exploitation☆1,010Aug 24, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Materials for Windows Malware Analysis training (volume 1)☆2,031Jul 1, 2024Updated last year
- A collection of links related to Linux kernel security and exploitation☆6,399Mar 7, 2026Updated last month
- PEDA - Python Exploit Development Assistance for GDB☆6,112Jul 29, 2024Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,623Jan 13, 2024Updated 2 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,003Aug 27, 2022Updated 3 years ago
- Repository of yara rules☆4,748Apr 17, 2024Updated last year
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,925Oct 20, 2025Updated 5 months ago