APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples
☆361Nov 10, 2022Updated 3 years ago
Alternatives and similar repositories for APTMalware
Users that are interested in APTMalware are comparing it to the libraries listed below
Sorting:
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173May 29, 2024Updated last year
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆961Updated this week
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- Sophos-ReversingLabs 20 million sample dataset☆691Apr 7, 2021Updated 4 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,929Updated this week
- APTnotes data☆1,773Dec 16, 2024Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆257Nov 22, 2021Updated 4 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,402Nov 7, 2024Updated last year
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆55Jun 27, 2015Updated 10 years ago
- Malware sample library.☆593Nov 21, 2023Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆246Aug 9, 2023Updated 2 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆754Nov 16, 2021Updated 4 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆715Oct 28, 2022Updated 3 years ago
- ☆76Sep 30, 2021Updated 4 years ago
- source code☆183May 6, 2019Updated 6 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,130Nov 22, 2024Updated last year
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,028Jul 1, 2024Updated last year
- ☆306May 6, 2021Updated 4 years ago
- Windows kernel and user mode emulation.☆1,860Feb 27, 2026Updated last week
- AVClass malware labeling tool☆484Oct 22, 2024Updated last year
- Various public documents, whitepapers and articles about APT campaigns☆3,647Jan 1, 2024Updated 2 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,300Jun 1, 2023Updated 2 years ago
- Malware Configuration And Payload Extraction☆3,031Feb 27, 2026Updated last week
- Malware Behavior Analyzer☆158Jun 1, 2017Updated 8 years ago
- Windows Events Attack Samples☆2,517Jan 24, 2023Updated 3 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- ☆103Nov 26, 2020Updated 5 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- ☆123May 3, 2023Updated 2 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code☆314Jan 13, 2021Updated 5 years ago
- A curated list of awesome malware analysis tools and resources☆45Jul 17, 2020Updated 5 years ago
- ☆111Dec 27, 2019Updated 6 years ago