hrtywhy / Malware-LibraryLinks
⚠️ Collection of malicious file ⚠️
☆13Updated 4 years ago
Alternatives and similar repositories for Malware-Library
Users that are interested in Malware-Library are comparing it to the libraries listed below
Sorting:
- ☆28Updated 4 years ago
- Just another collection of links, tools, reports and other stuff☆24Updated 3 years ago
- A curated malware database with more then +73000 samples.☆17Updated 4 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆41Updated last year
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Updated 6 months ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- A Collection of Android Malware☆17Updated 6 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- ☆32Updated last year
- Malware Development☆11Updated 4 years ago
- ☆38Updated 3 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆53Updated 5 months ago
- Collection of my own detection rules☆20Updated last year
- A feed of malware samples curated from threat intelligence sources.☆28Updated last year
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated last year
- IDA Python scripts☆36Updated last month
- Conti Ransomware Source Code☆19Updated 3 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- ClipBanker Spy Trojan☆11Updated 8 months ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Updated last year
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 4 years ago
- ☆39Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆29Updated 11 months ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- ☆73Updated last year
- ☆37Updated 3 years ago
- ☆25Updated last year
- A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.☆27Updated last month