mstfknn / malware-sample-libraryLinks
Malware sample library.
☆585Updated 2 years ago
Alternatives and similar repositories for malware-sample-library
Users that are interested in malware-sample-library are comparing it to the libraries listed below
Sorting:
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆925Updated last year
- Bringing you the best of the worst files on the Internet.☆342Updated 4 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆550Updated last month
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,206Updated 3 months ago
- malware source codes☆565Updated 2 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆721Updated 2 years ago
- An open source script to perform malware static analysis on Portable Executable☆318Updated 2 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,127Updated 7 months ago
- A collection of malware samples caught by several honeypots i manage☆1,758Updated 4 years ago
- fireELF - Fileless Linux Malware Framework☆677Updated 6 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code☆306Updated 4 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆618Updated 3 years ago
- Python Decoders for Common Remote Access Trojans☆1,113Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,591Updated last year
- Collection of almost 40.000 javascript malware samples☆730Updated last year
- Malware Configuration And Payload Extraction☆760Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆584Updated last year
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆353Updated 3 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆436Updated last year
- A Linux Ransomware☆759Updated 10 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆654Updated last week
- Volatility plugin for extracts configuration data of known malware☆496Updated last year
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 3 years ago
- MBC content in markdown☆499Updated 5 months ago
- Personal research and publication on malware families☆142Updated 11 months ago
- A static analyzer for PE executables.☆1,094Updated last year
- Malware Analyst's Cookbook stuffs☆161Updated 10 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,245Updated 2 weeks ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆476Updated 4 years ago
- ☆713Updated 3 years ago