jstrosch / malware-samplesLinks
Malware samples, analysis exercises and other interesting resources.
☆1,589Updated last year
Alternatives and similar repositories for malware-samples
Users that are interested in malware-samples are comparing it to the libraries listed below
Sorting:
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆921Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆823Updated 2 years ago
- Binaries for the book Practical Malware Analysis☆1,383Updated 3 years ago
- Malware Configuration And Payload Extraction☆2,789Updated this week
- Bringing you the best of the worst files on the Internet.☆340Updated 4 years ago
- MBC content in markdown☆492Updated 5 months ago
- Malware sample library.☆585Updated last year
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,459Updated last week
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,225Updated last week
- Labs for Practical Malware Analysis & Triage☆1,041Updated 7 months ago
- Malware Sample Sources☆587Updated 4 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,012Updated last year
- A collection of malware samples caught by several honeypots i manage☆1,751Updated 4 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆884Updated last year
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆673Updated last year
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,122Updated 7 months ago
- yarGen is a generator for YARA rules☆1,738Updated last month
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,031Updated 5 months ago
- Resources for Windows exploit development☆1,627Updated 3 years ago
- Research code & papers from members of vx-underground.☆1,314Updated 3 years ago
- ReversingLabs YARA Rules☆872Updated last week
- Indicators of Compromises (IOC) of our various investigations☆1,874Updated 3 weeks ago
- Everything related to Linux Forensics☆710Updated 2 years ago
- A list of cyber-chef recipes and curated links☆2,147Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆649Updated last week
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,792Updated 4 years ago
- Windows Events Attack Samples☆2,441Updated 2 years ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆776Updated 4 months ago
- Organized list of my malware development resources☆1,645Updated 3 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆719Updated 2 years ago