demon-i386 / malware-analysisLinks
Open malware analysis / reversing database
☆11Updated 4 years ago
Alternatives and similar repositories for malware-analysis
Users that are interested in malware-analysis are comparing it to the libraries listed below
Sorting:
- 「💽」MBR Overwrite malware for linux☆27Updated 10 months ago
- Misery Loader to bypass modern EDR solutions☆14Updated 9 months ago
- CLI program to calculate the entropy of files☆73Updated last year
- This is my malware database, but I AM NOT RESPONSIABLE FOR ANY DAMAGE + pan koza is a skid and ready to fork this $h!t.☆11Updated last year
- Malware and malicious applications database☆39Updated last year
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 3 years ago
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 3 years ago
- General malware analysis stuff☆37Updated last year
- DNS over HTTPS targeted malware (only runs once)☆95Updated 2 years ago
- Multiplatform CLI and GUI tool to show information about ELF files☆60Updated 3 months ago
- A simple multiplatform command line search tool for Windows API.☆48Updated 7 months ago
- Stub for polymorphic code☆11Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- Get started with writing your first ever Windows Driver☆35Updated last year
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆80Updated last year
- PE Injector - Inject code on 32-bit and 64-bit PE executables☆33Updated 4 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆41Updated last year
- This is a simple process injection made in C for Linux systems☆29Updated 2 years ago
- Conti Ransomware Source Code☆20Updated 3 years ago
- Actual real-world ransomware coded in WinAPI C++ with the help of the Cryptography API made to encrypt a whole Windows installation☆10Updated 2 years ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆44Updated 10 months ago
- ⚠️ Collection of malicious file ⚠️☆13Updated 4 years ago
- Ransomware hello kitty☆23Updated 4 years ago
- ☆33Updated 2 years ago
- Kernel module that allows hiding files in any filesystem☆22Updated 9 months ago
- Some ELF Malwares☆10Updated 3 years ago
- Compiler for the Jack Programming Language☆19Updated 11 months ago
- A curated malware database with more then +73000 samples.☆17Updated 4 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 7 months ago