jstrosch / malware-samples
Malware samples, analysis exercises and other interesting resources.
☆1,498Updated last year
Alternatives and similar repositories for malware-samples:
Users that are interested in malware-samples are comparing it to the libraries listed below
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆890Updated 9 months ago
- Malware Configuration And Payload Extraction☆2,109Updated this week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,070Updated last month
- A curated list of awesome YARA rules, tools, and people.☆3,646Updated 2 months ago
- yarGen is a generator for YARA rules☆1,586Updated 7 months ago
- Malware sample library.☆562Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆800Updated last year
- A collection of malware samples caught by several honeypots i manage☆1,647Updated 3 years ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,774Updated last year
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,084Updated last month
- Indicators of Compromises (IOC) of our various investigations☆1,712Updated last month
- Malware Sample Sources☆541Updated 3 years ago
- Labs for Practical Malware Analysis & Triage☆910Updated 2 months ago
- YARA signature and IOC database for my scanners and tools☆2,525Updated last month
- Research code & papers from members of vx-underground.☆1,174Updated 3 years ago
- Materials for Windows Malware Analysis training (volume 1)☆1,957Updated 6 months ago
- Binaries for the book Practical Malware Analysis☆1,201Updated 2 years ago
- Resources for Windows exploit development☆1,552Updated 3 years ago
- Windows Events Attack Samples☆2,286Updated last year
- A list of cyber-chef recipes and curated links☆2,049Updated 7 months ago
- Defences against Cobalt Strike☆1,282Updated 2 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,497Updated last year
- Interesting APT Report Collection And Some Special IOC☆2,480Updated this week
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆614Updated 6 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆707Updated 2 years ago
- An Active Defense and EDR software to empower Blue Teams☆1,249Updated last year
- Bringing you the best of the worst files on the Internet.☆313Updated 3 years ago
- ☆2,217Updated last year
- Red Teaming Tactics and Techniques☆4,116Updated 4 months ago
- ReversingLabs YARA Rules☆780Updated last month