Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code
☆313Jan 13, 2021Updated 5 years ago
Alternatives and similar repositories for iot-malware
Users that are interested in iot-malware are comparing it to the libraries listed below
Sorting:
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- Repo with some info about malware in IoT☆15May 31, 2018Updated 7 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- The Multiplatform Linux Sandbox☆265Jan 3, 2022Updated 4 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- Python telnet honeypot for catching botnet binaries☆313Feb 2, 2024Updated 2 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Jun 21, 2022Updated 3 years ago
- malware source codes☆570Dec 16, 2022Updated 3 years ago
- An archive of BASHLITE source code☆12Oct 29, 2016Updated 9 years ago
- AVClass malware labeling tool☆484Oct 22, 2024Updated last year
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,148Apr 14, 2025Updated 10 months ago
- ☆14Feb 23, 2018Updated 8 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- Presented hardware reverse engineering workshops since 2019☆61Aug 8, 2024Updated last year
- Sandbox for automated Linux malware analysis.☆485May 1, 2023Updated 2 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- Miscellaneous Malware RE☆193May 1, 2022Updated 3 years ago
- A curated malware database with more then +73000 samples.☆19Feb 20, 2021Updated 5 years ago
- ☆20Aug 19, 2017Updated 8 years ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆2,046Jul 21, 2024Updated last year
- Devestating and awesome Linux X86_64 ELF Virus☆237Sep 9, 2022Updated 3 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆43Mar 18, 2015Updated 10 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173May 29, 2024Updated last year
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆361Nov 10, 2022Updated 3 years ago
- ☆55Jul 13, 2015Updated 10 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆66Nov 10, 2017Updated 8 years ago
- Diff tool for comparing export tables in PE images☆24Mar 4, 2020Updated 5 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,917Feb 20, 2026Updated last week
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆256Oct 29, 2023Updated 2 years ago
- Carberp Banking Trojan☆126Feb 25, 2015Updated 11 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆9,196Oct 16, 2025Updated 4 months ago
- Build a Mirai botnet from the source code.☆42Jul 23, 2019Updated 6 years ago
- ☆16May 22, 2014Updated 11 years ago
- interesting analysis☆16May 14, 2018Updated 7 years ago