VirusSign / malware-samplesLinks
Live malware samples and database, daily update.
☆21Updated 2 months ago
Alternatives and similar repositories for malware-samples
Users that are interested in malware-samples are comparing it to the libraries listed below
Sorting:
- A specification and style guide for YARA rules☆50Updated last year
- This is a collection of RATs for educational purposes☆44Updated this week
- IOCs collected during day-to-day activities☆70Updated this week
- ☆66Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 6 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆57Updated last year
- Quick analysis focusing on most important of a Malware or a Threat☆41Updated last year
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆47Updated last month
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated 2 years ago
- Knowledge base for reverse engineering and malware analysis☆11Updated 6 months ago
- Repository of Yara Rules☆112Updated 3 months ago
- Some of my Malware Analysis writeups☆46Updated 2 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆55Updated 3 months ago
- Malware Analysis Exercise Samples and Resources☆44Updated last month
- Baseline a Windows System against LOLBAS☆27Updated last year
- God Mode Detection Rules☆134Updated 11 months ago
- ☆38Updated last week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆67Updated last month
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- Configuration Extractors for Malware☆108Updated 2 months ago
- ☆67Updated 5 months ago
- Yara Rules for Modern Malware☆77Updated last year
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆14Updated last year
- A Repository to Track Anti-Forensic Techniques☆110Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆114Updated 2 years ago
- Dump quarantined files from Windows Defender☆64Updated 3 years ago
- ☆44Updated 4 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆66Updated last year