jstrosch / malware-samplesLinks
Malware samples, analysis exercises and other interesting resources.
☆1,568Updated last year
Alternatives and similar repositories for malware-samples
Users that are interested in malware-samples are comparing it to the libraries listed below
Sorting:
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆915Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆817Updated 2 years ago
- Binaries for the book Practical Malware Analysis☆1,311Updated 3 years ago
- Malware sample library.☆575Updated last year
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,308Updated last week
- Some of my publicly available Malware analysis and Reverse engineering.☆820Updated last year
- Bringing you the best of the worst files on the Internet.☆333Updated 4 years ago
- MBC content in markdown☆467Updated last month
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,165Updated last week
- Materials for Windows Malware Analysis training (volume 1)☆1,998Updated last year
- Labs for Practical Malware Analysis & Triage☆998Updated 3 months ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆781Updated 9 months ago
- Everything related to Linux Forensics☆703Updated 2 years ago
- yarGen is a generator for YARA rules☆1,676Updated 3 months ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆648Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆710Updated 2 years ago
- A collection of malware samples caught by several honeypots i manage☆1,717Updated 3 years ago
- ReversingLabs YARA Rules☆834Updated last month
- A curated list of awesome YARA rules, tools, and people.☆3,888Updated 4 months ago
- Malware Configuration And Payload Extraction☆2,562Updated this week
- Research code & papers from members of vx-underground.☆1,274Updated 3 years ago
- YARA signature and IOC database for my scanners and tools☆2,697Updated last week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,952Updated 2 months ago
- Indicators of Compromises (IOC) of our various investigations☆1,800Updated last week
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆610Updated 2 weeks ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,743Updated 4 years ago
- Malware Sample Sources☆575Updated 4 years ago
- Resources for Windows exploit development☆1,604Updated 3 years ago
- Windows Events Attack Samples☆2,400Updated 2 years ago
- Sophos-originated indicators-of-compromise from published reports☆608Updated this week