demon-i386 / malware-analysisLinks
Open malware analysis / reversing database
☆11Updated 4 years ago
Alternatives and similar repositories for malware-analysis
Users that are interested in malware-analysis are comparing it to the libraries listed below
Sorting:
- CLI program to calculate the entropy of files☆71Updated last year
- Multiplatform CLI and GUI tool to show information about ELF files☆60Updated 2 months ago
- 「💽」MBR Overwrite malware for linux☆26Updated 9 months ago
- A simple multiplatform command line search tool for Windows API.☆48Updated 6 months ago
- Stub for polymorphic code☆11Updated 2 years ago
- General malware analysis stuff☆37Updated last year
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 2 years ago
- PE Injector - Inject code on 32-bit and 64-bit PE executables☆33Updated 4 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆44Updated 9 months ago
- Malware and malicious applications database☆38Updated last year
- ⚠️ Collection of malicious file ⚠️☆13Updated 4 years ago
- This is my malware database, but I AM NOT RESPONSIABLE FOR ANY DAMAGE + pan koza is a skid and ready to fork this $h!t.☆11Updated last year
- Misery Loader to bypass modern EDR solutions☆14Updated 9 months ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 3 years ago
- ☆37Updated 6 months ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Polymorphic ELF Virus☆17Updated 3 years ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆81Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 8 months ago
- ☆19Updated 3 years ago
- Get started with writing your first ever Windows Driver☆35Updated last year
- A curated malware database with more then +73000 samples.☆17Updated 4 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆39Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- ☆10Updated 3 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Vulnerable EDR☆21Updated 10 months ago
- ☆55Updated 3 years ago
- Capture newly created files on Windows☆66Updated 3 years ago