jstrosch / malware-samplesLinks
Malware samples, analysis exercises and other interesting resources.
☆1,564Updated last year
Alternatives and similar repositories for malware-samples
Users that are interested in malware-samples are comparing it to the libraries listed below
Sorting:
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆913Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆816Updated 2 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆817Updated last year
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,157Updated last week
- Bringing you the best of the worst files on the Internet.☆334Updated 4 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,280Updated 5 months ago
- Malware sample library.☆575Updated last year
- Malware Sample Sources☆571Updated 4 years ago
- MBC content in markdown☆461Updated last month
- Binaries for the book Practical Malware Analysis☆1,301Updated 3 years ago
- Labs for Practical Malware Analysis & Triage☆986Updated 3 months ago
- Materials for Windows Malware Analysis training (volume 1)☆1,995Updated last year
- yarGen is a generator for YARA rules☆1,665Updated 3 months ago
- Research code & papers from members of vx-underground.☆1,258Updated 3 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,792Updated last week
- ReversingLabs YARA Rules☆828Updated last week
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆648Updated last year
- Malware Configuration And Payload Extraction☆2,526Updated this week
- A collection of malware samples caught by several honeypots i manage☆1,710Updated 3 years ago
- Everything related to Linux Forensics☆702Updated last year
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,937Updated last month
- YARA signature and IOC database for my scanners and tools☆2,669Updated this week
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆710Updated 2 years ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆779Updated 8 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆607Updated 3 weeks ago
- A curated list of awesome YARA rules, tools, and people.☆3,865Updated 3 months ago
- A list of cyber-chef recipes and curated links☆2,115Updated last year
- Windows Events Attack Samples☆2,387Updated 2 years ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,738Updated 4 years ago
- ☆515Updated 9 months ago