Code written as part of our various malware investigations
☆410Nov 25, 2025Updated 5 months ago
Alternatives and similar repositories for malware-research
Users that are interested in malware-research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of Compromises (IOC) of our various investigations☆1,948Apr 23, 2026Updated last week
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- Various snippets created during malware analysis☆466Oct 3, 2025Updated 7 months ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- A static analyzer for PE executables.☆1,122Mar 11, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- malware source codes☆578Dec 16, 2022Updated 3 years ago
- FAME Automates Malware Evaluation☆939Updated this week
- IPython console integration for IDA Pro☆839Feb 19, 2026Updated 2 months ago
- Official repository for Pyew.☆393Sep 6, 2019Updated 6 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆400May 20, 2016Updated 9 years ago
- VMAttack PlugIn for IDA Pro☆871Nov 30, 2017Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- Miscellaneous Malware RE☆195May 1, 2022Updated 4 years ago
- YARA signature and IOC database for my scanners and tools☆2,931Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,265Mar 26, 2026Updated last month
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆391Sep 21, 2023Updated 2 years ago
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆686Aug 14, 2019Updated 6 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 8 months ago
- Collection of scripts for different malware analysis tasks☆76Jul 15, 2019Updated 6 years ago
- ☆717Oct 28, 2022Updated 3 years ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- Malcom - Malware Communications Analyzer☆1,168Nov 29, 2017Updated 8 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,982Apr 23, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆740Mar 17, 2019Updated 7 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.☆644Nov 27, 2024Updated last year
- Builds malware analysis Windows VMs so that you don't have to.☆1,044Aug 23, 2021Updated 4 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 5 years ago
- A OS X crypto ransomware PoC☆89Sep 4, 2015Updated 10 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆472Jan 19, 2019Updated 7 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆995Feb 10, 2019Updated 7 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Kaspersky's GReAT KLara☆733Jul 24, 2024Updated last year
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls☆153Mar 17, 2016Updated 10 years ago
- Demos of various injection techniques found in malware☆791Feb 15, 2022Updated 4 years ago
- ☆12Apr 13, 2017Updated 9 years ago
- Malware Configuration And Payload Extraction☆760Nov 22, 2024Updated last year
- APTnotes data☆1,786Dec 16, 2024Updated last year