drbeni / malquariumView external linksLinks
Malquarium - Modern Malware Repository
☆47Updated this week
Alternatives and similar repositories for malquarium
Users that are interested in malquarium are comparing it to the libraries listed below
Sorting:
- Malware captured with honeypots☆38Oct 2, 2017Updated 8 years ago
- Incarcero is a tool that creates Virtual Machines (VMs) preconfigured with malware analysis tools and security settings tailored for malw…☆92Nov 4, 2023Updated 2 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Malware sample library.☆593Nov 21, 2023Updated 2 years ago
- My favorite resources and tools for malware analysis.☆43Aug 18, 2020Updated 5 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- Source codes of malwares, stress tests etc. for computer.☆38Feb 2, 2020Updated 6 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- ☆24Mar 12, 2025Updated 11 months ago
- Malware.lu tools☆63Oct 28, 2013Updated 12 years ago
- lnk_parser is a full rust implementation to parse windows LNK files☆22Jul 12, 2025Updated 7 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- A Simple Python 3 Reverse Shell Script☆11Dec 24, 2018Updated 7 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆29Feb 16, 2021Updated 4 years ago
- Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection☆36Mar 14, 2018Updated 7 years ago
- Useful commands for infosec☆28Feb 13, 2023Updated 3 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆930Mar 26, 2024Updated last year
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- ☆15Mar 13, 2018Updated 7 years ago
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 4 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Microsoft Compound File Binary (CFB) file format Python IO☆15Aug 27, 2014Updated 11 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆12Dec 3, 2020Updated 5 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated last year
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- python tools to assist in penetration testing☆14Jan 19, 2026Updated 3 weeks ago
- PDF Parser is a command line tool and go library for analyzing PDF files.☆14Jan 25, 2024Updated 2 years ago
- Collection of almost 40.000 javascript malware samples☆741Jul 23, 2024Updated last year
- My Yara Rules Collection☆53Feb 7, 2016Updated 10 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year