A curated list of malware repositories, trackers and malware analysis tools
☆94Feb 4, 2023Updated 3 years ago
Alternatives and similar repositories for malware-tools
Users that are interested in malware-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- Resources for learning malware analysis and reverse engineering☆144Feb 7, 2024Updated 2 years ago
- Tools to search through massive amounts of data☆21Oct 20, 2025Updated 5 months ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- Run TTPs, with AI!☆125Feb 23, 2026Updated last month
- Powershell sandboxing utility☆19Mar 2, 2026Updated last month
- Tools for generating and validating IBANs (International Bank Account Numbers)☆10Aug 11, 2020Updated 5 years ago
- A list of private and public (more or less) blackhat boards☆278Mar 9, 2019Updated 7 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆20Jun 27, 2019Updated 6 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- Miscellaneous Malware RE☆194May 1, 2022Updated 3 years ago
- Paper and Links to Crimeware in the Modern Era☆31Sep 5, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 9 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 3 years ago
- Spoof parent process ID☆14Jan 23, 2019Updated 7 years ago
- An open source script to perform malware static analysis on Portable Executable☆332May 23, 2023Updated 2 years ago
- Sources Codes of many Office Malwares☆18Sep 4, 2022Updated 3 years ago
- Community modules for CAPE Sandbox☆111Mar 25, 2026Updated 3 weeks ago
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆51Sep 6, 2023Updated 2 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Notes and IoCs of fresh malware☆63Jul 5, 2024Updated last year
- FAME Automates Malware Evaluation☆936Dec 16, 2025Updated 4 months ago
- For all these times you're asking yourself "what is this panel again?"☆262Jan 29, 2026Updated 2 months ago
- ☆130Feb 2, 2025Updated last year
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- CLI tool to analyze PE files☆90Sep 23, 2024Updated last year
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- My Yara Rules Collection☆52Feb 7, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Incarcero is a tool that creates Virtual Machines (VMs) preconfigured with malware analysis tools and security settings tailored for malw…☆92Nov 4, 2023Updated 2 years ago
- 🌦️ Domain Ranker☆16Sep 7, 2019Updated 6 years ago
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- A mapping of used malware names to commonly known family names☆63Feb 21, 2023Updated 3 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- ☆27Mar 2, 2022Updated 4 years ago
- 恶意软件原理图☆60Mar 29, 2021Updated 5 years ago