funtimes-ninja / malware
Malware samples from honeypots
☆70Updated 7 years ago
Alternatives and similar repositories for malware:
Users that are interested in malware are comparing it to the libraries listed below
- A warehouse for your malware☆134Updated 11 years ago
- Malware Repository Framework☆100Updated 6 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆105Updated 4 years ago
- ☆68Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Some IR notes☆73Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆56Updated 10 years ago
- NTP logger/honeypot☆52Updated 10 years ago
- ☆76Updated 2 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated last month
- Static and automated/dynamic malware analysis☆46Updated 9 years ago
- A python script used to parse the SAM registry hive.☆72Updated 6 years ago
- Yara rules☆47Updated 10 years ago
- Analyse SQL injection attempts in web server logs☆82Updated 8 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆77Updated 7 years ago
- Passive DNS V2☆62Updated 10 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆77Updated 4 years ago
- Manage VT Alerts☆62Updated 8 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆80Updated 8 years ago
- Maltese - Malware Traffic Emulator☆26Updated 7 years ago
- Cryptowall Tooling & Information☆34Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆81Updated 7 years ago