digitaldisarray / Malware-AnalysisLinks
My favorite resources and tools for malware analysis.
β40Updated 4 years ago
Alternatives and similar repositories for Malware-Analysis
Users that are interested in Malware-Analysis are comparing it to the libraries listed below
Sorting:
- iOS malware samplesβ43Updated 9 years ago
- Fresh malware samples caught in the wild daily from random places. π£β18Updated 5 years ago
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.β26Updated 2 years ago
- A collection of malware samples caught by DIONAEA Honeypotβ11Updated 6 years ago
- Malware captured with honeypotsβ38Updated 7 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.β43Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β34Updated 6 years ago
- Information Stealers Wall of Sheep (IS-WOS)β12Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.β22Updated 3 years ago
- Sources Codes of many Office Malwaresβ16Updated 2 years ago
- β30Updated 6 months ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systemsβ51Updated 6 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloadsβ26Updated 3 years ago
- β23Updated 4 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testingβ21Updated 2 years ago
- Automated Payload Test Controllerβ10Updated 7 years ago
- Static Decryptor for IcedID Malwareβ18Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.β19Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysisβ13Updated 2 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM toolβ¦β28Updated 5 years ago
- Autopsy Module to analyze Registry Hivesβ15Updated 3 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.β30Updated 2 years ago
- Repository of Yara rules created by the Stratosphere teamβ26Updated 3 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.β22Updated 2 years ago
- β18Updated 4 years ago
- Dataset of packed ELF samplesβ19Updated 2 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.β13Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can lβ¦β16Updated 4 years ago
- Royal Road RTF Weaponizer object decoderβ24Updated 8 months ago
- Malware campaigns and APTs research by BlackArrowβ18Updated 5 years ago