Malware Samples that could be used for teaching students about malware analysis.
☆63Apr 8, 2024Updated last year
Alternatives and similar repositories for malware4edu
Users that are interested in malware4edu are comparing it to the libraries listed below
Sorting:
- ☆19Jul 29, 2022Updated 3 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Reverse Engineering and Debugging Malware☆32Feb 27, 2023Updated 3 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Learning volatility plugins.☆19Feb 16, 2021Updated 5 years ago
- Sources Codes of many MSIL malwares☆24Aug 29, 2022Updated 3 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- Everything related to Linux Forensics☆717Jul 13, 2023Updated 2 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆192Aug 3, 2025Updated 7 months ago
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Materials from different CTFs for later reuse☆27Mar 23, 2023Updated 2 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- A Chrome Extension, built to keep you updated with the latest happenings, upcoming contests and, new tech innovations.☆18Dec 15, 2021Updated 4 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- recovers and reconstructs fragmented Evtx files from disk images, memory dumps, pagefiles and unallocated space☆13Feb 3, 2015Updated 11 years ago
- LNK to JSON☆14Mar 7, 2019Updated 6 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Feb 5, 2022Updated 4 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- Writeups for CTF challenges☆35Nov 12, 2023Updated 2 years ago
- My favorite resources and tools for malware analysis.☆43Aug 18, 2020Updated 5 years ago
- Process HTTP Pcaps With YARA☆108Jul 29, 2013Updated 12 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- Vault of Windows Registry forensic artifacts☆28Nov 12, 2025Updated 3 months ago
- for Windows Malware Analysis☆16May 14, 2020Updated 5 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35May 21, 2025Updated 9 months ago
- Collect information of Windows PC when doing incident response☆252Jun 5, 2023Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆103May 11, 2022Updated 3 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year