demon-i386 / malware-analysisLinks
Open malware analysis / reversing database
☆11Updated 4 years ago
Alternatives and similar repositories for malware-analysis
Users that are interested in malware-analysis are comparing it to the libraries listed below
Sorting:
- Multiplatform CLI and GUI tool to show information about ELF files☆59Updated 2 weeks ago
- 「💽」MBR Overwrite malware for linux☆26Updated 7 months ago
- CLI program to calculate the entropy of files☆70Updated last year
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆45Updated 7 months ago
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 2 years ago
- General malware analysis stuff☆37Updated 10 months ago
- Collection of ezine about virii☆17Updated 2 years ago
- ☆19Updated 2 years ago
- Some ELF Malwares☆10Updated 3 years ago
- A simple multiplatform command line search tool for Windows API.☆46Updated 4 months ago
- This is my malware database, but I AM NOT RESPONSIABLE FOR ANY DAMAGE + pan koza is a skid and ready to fork this $h!t.☆11Updated last year
- ☆34Updated 7 years ago
- Exploit development challenges!☆24Updated 2 years ago
- Malware and malicious applications database☆38Updated last year
- An ELF / PE binary packer written in pure C, made for fun☆93Updated last year
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 3 years ago
- 🔨 Linux Hash Cracker☆31Updated last year
- Source Code of MSIL Ransom☆14Updated 2 years ago
- PE Injector - Inject code on 32-bit and 64-bit PE executables☆33Updated 3 years ago
- ⚠️ Collection of malicious file ⚠️☆13Updated 4 years ago
- A curated malware database with more then +73000 samples.☆17Updated 4 years ago
- ☆33Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Stub for polymorphic code☆12Updated 2 years ago
- Sources Codes of many MSIL malwares☆24Updated 2 years ago
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 3 years ago
- Sources Codes of many Office Malwares☆17Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 2 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Updated 2 years ago