shared samples from #dailyphish and/or #apt tweets
☆41Sep 3, 2025Updated 5 months ago
Alternatives and similar repositories for samples
Users that are interested in samples are comparing it to the libraries listed below
Sorting:
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- ☆18Mar 26, 2024Updated last year
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- NTFS samples☆27Aug 1, 2020Updated 5 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆96Feb 9, 2026Updated 2 weeks ago
- ☆12Jun 29, 2021Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- ☆17Nov 13, 2024Updated last year
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆58Sep 15, 2025Updated 5 months ago
- IDA Pro plugin that changes color of call instructions and works with all architectures☆59Nov 6, 2018Updated 7 years ago
- ☆23Mar 17, 2024Updated last year
- ☆34Nov 11, 2025Updated 3 months ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 10 months ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- ☆25Jan 8, 2024Updated 2 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- ☆46Nov 10, 2025Updated 3 months ago
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 10 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- Simple Project that Extracts PE Information.☆21Apr 4, 2025Updated 10 months ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- Some of my Malware Analysis writeups☆47Oct 3, 2025Updated 4 months ago
- PoCs of RCEs against open source C2 servers☆91Sep 28, 2024Updated last year
- This repository contains the analysis reports, technical details or any tools created for helping in malware analysis. Additionally, the …☆23Jun 17, 2025Updated 8 months ago
- ☆52Aug 19, 2025Updated 6 months ago
- God Mode Detection Rules☆133Aug 8, 2024Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- 阿里云Web 应用防火墙 操作工具 (API调用工具GUI版本) v1.0☆23Jun 24, 2025Updated 8 months ago
- RCE through a race condition in Apache Tomcat☆56Dec 21, 2024Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Dec 29, 2024Updated last year
- ☆96May 5, 2025Updated 9 months ago