funtimes-ninja / malwareLinks
Malware samples from honeypots
☆71Updated 7 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- A warehouse for your malware☆134Updated 12 years ago
- A collection of infosec related scripts and information.☆53Updated 8 months ago
- Malware Repository Framework☆99Updated 7 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆93Updated 9 years ago
- Python Malware Crawler for Zoos and Repositories☆108Updated 7 years ago
- ☆68Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Some IR notes☆73Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Process HTTP Pcaps With YARA☆103Updated 11 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Suricata rules for Emerging Threats and funkyness☆74Updated 8 years ago
- Malware Control Monitor☆87Updated 10 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- ☆75Updated 3 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Mitre chopshop network decoder framework☆30Updated 8 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Malware.lu tools☆63Updated 11 years ago
- Various public documents, whitepapers and articles about APT campaigns☆54Updated 9 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Updated 6 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆51Updated 9 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Yara rules☆48Updated 11 years ago
- Passive DNS V2☆60Updated 11 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago