Code written as part of our various malware investigations
☆408Nov 25, 2025Updated 3 months ago
Alternatives and similar repositories for malware-research
Users that are interested in malware-research are comparing it to the libraries listed below
Sorting:
- Indicators of Compromises (IOC) of our various investigations☆1,922Feb 20, 2026Updated last week
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- malware source codes☆570Dec 16, 2022Updated 3 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- A static analyzer for PE executables.☆1,107Feb 24, 2026Updated last week
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- FAME Automates Malware Evaluation☆929Dec 16, 2025Updated 2 months ago
- Official repository for Pyew.☆394Sep 6, 2019Updated 6 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- YARA signature and IOC database for my scanners and tools☆2,874Feb 5, 2026Updated 3 weeks ago
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆684Aug 14, 2019Updated 6 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,233Aug 7, 2025Updated 6 months ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆743Mar 17, 2019Updated 6 years ago
- ☆715Oct 28, 2022Updated 3 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398May 20, 2016Updated 9 years ago
- VMAttack PlugIn for IDA Pro☆866Nov 30, 2017Updated 8 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- IPython console integration for IDA Pro☆836Feb 19, 2026Updated last week
- Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness☆526Jun 22, 2025Updated 8 months ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- A OS X crypto ransomware PoC☆89Sep 4, 2015Updated 10 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,897Feb 23, 2026Updated last week
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Kaspersky's GReAT KLara☆732Jul 24, 2024Updated last year
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆387Sep 21, 2023Updated 2 years ago
- Collection of scripts for different malware analysis tasks☆76Jul 15, 2019Updated 6 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Feb 10, 2019Updated 7 years ago
- Demos of various injection techniques found in malware☆796Feb 15, 2022Updated 4 years ago
- Miscellaneous Malware RE☆193May 1, 2022Updated 3 years ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,846Feb 25, 2025Updated last year
- Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.☆644Nov 27, 2024Updated last year
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆387May 11, 2022Updated 3 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 11 years ago
- APTnotes data☆1,773Dec 16, 2024Updated last year
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆297Nov 23, 2017Updated 8 years ago
- yarGen is a generator for YARA rules☆1,776Jan 10, 2026Updated last month
- ☆12Apr 13, 2017Updated 8 years ago