jstrosch / malware-samples
Malware samples, analysis exercises and other interesting resources.
☆1,550Updated last year
Alternatives and similar repositories for malware-samples:
Users that are interested in malware-samples are comparing it to the libraries listed below
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆908Updated last year
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,184Updated 3 months ago
- yarGen is a generator for YARA rules☆1,637Updated last month
- YARA signature and IOC database for my scanners and tools☆2,608Updated this week
- Bringing you the best of the worst files on the Internet.☆326Updated 4 years ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,885Updated last year
- ReversingLabs YARA Rules☆816Updated 3 weeks ago
- Research code & papers from members of vx-underground.☆1,230Updated 3 years ago
- Malware sample library.☆571Updated last year
- Materials for Windows Malware Analysis training (volume 1)☆1,987Updated 10 months ago
- Malware Configuration And Payload Extraction☆2,391Updated last week
- Labs for Practical Malware Analysis & Triage☆965Updated last month
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,095Updated 3 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,133Updated this week
- Windows Events Attack Samples☆2,352Updated 2 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆808Updated 11 months ago
- A not so awesome list of malware gems for aspiring malware analysts☆805Updated 2 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆706Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,244Updated 8 months ago
- A list of cyber-chef recipes and curated links☆2,075Updated 10 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,588Updated last year
- A curated list of awesome YARA rules, tools, and people.☆3,788Updated last month
- MBC content in markdown☆440Updated last month
- ☆2,270Updated last year
- ☆1,045Updated 11 months ago
- Collection of various malicious functionality to aid in malware development☆1,636Updated last year
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,155Updated last month
- Defences against Cobalt Strike☆1,283Updated 2 years ago
- Interesting APT Report Collection And Some Special IOC☆2,549Updated this week
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,111Updated last year