Code written as part of our various malware investigations
☆409Nov 25, 2025Updated 3 months ago
Alternatives and similar repositories for malware-research
Users that are interested in malware-research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of Compromises (IOC) of our various investigations☆1,934Updated this week
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- A static analyzer for PE executables.☆1,112Mar 11, 2026Updated last week
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- malware source codes☆571Dec 16, 2022Updated 3 years ago
- FAME Automates Malware Evaluation☆931Dec 16, 2025Updated 3 months ago
- IPython console integration for IDA Pro☆837Feb 19, 2026Updated last month
- Official repository for Pyew.☆394Sep 6, 2019Updated 6 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆399May 20, 2016Updated 9 years ago
- VMAttack PlugIn for IDA Pro☆867Nov 30, 2017Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- YARA signature and IOC database for my scanners and tools☆2,884Mar 9, 2026Updated 2 weeks ago
- Miscellaneous Malware RE☆193May 1, 2022Updated 3 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,240Aug 7, 2025Updated 7 months ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆390Sep 21, 2023Updated 2 years ago
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆686Aug 14, 2019Updated 6 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 7 months ago
- Collection of scripts for different malware analysis tasks☆76Jul 15, 2019Updated 6 years ago
- ☆715Oct 28, 2022Updated 3 years ago
- Malcom - Malware Communications Analyzer☆1,165Nov 29, 2017Updated 8 years ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,923Mar 17, 2026Updated last week
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆742Mar 17, 2019Updated 7 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.☆644Nov 27, 2024Updated last year
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆473Jan 19, 2019Updated 7 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,043Aug 23, 2021Updated 4 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 4 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆996Feb 10, 2019Updated 7 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- Kaspersky's GReAT KLara☆733Jul 24, 2024Updated last year
- Malware Configuration And Payload Extraction☆762Nov 22, 2024Updated last year
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls☆153Mar 17, 2016Updated 10 years ago
- Demos of various injection techniques found in malware☆791Feb 15, 2022Updated 4 years ago
- Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness☆528Jun 22, 2025Updated 9 months ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- ☆12Apr 13, 2017Updated 8 years ago