A collection of resources if you want to get into malware research. Pull requests are very welcome.
☆123Mar 28, 2019Updated 6 years ago
Alternatives and similar repositories for malware-analysis-resources
Users that are interested in malware-analysis-resources are comparing it to the libraries listed below
Sorting:
- ☆17Aug 24, 2020Updated 5 years ago
- Hardens Windows Server to CIS Standards☆40May 2, 2019Updated 6 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- security related events, tools, tutorials, cheatsheets, and more.☆11Oct 20, 2015Updated 10 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- JPCERT/CC public YARA rules repository☆109Nov 14, 2025Updated 3 months ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 2 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 5 months ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 11 months ago
- ☆11May 28, 2022Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- no longer maintained☆18Feb 22, 2018Updated 8 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Event Trace Log file parser in pure Python☆150Nov 27, 2020Updated 5 years ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆64Dec 18, 2024Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago