mstfknn / malware-sample-library
Malware sample library.
☆567Updated last year
Alternatives and similar repositories for malware-sample-library:
Users that are interested in malware-sample-library are comparing it to the libraries listed below
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆897Updated 11 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆707Updated 2 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,140Updated last year
- Bringing you the best of the worst files on the Internet.☆318Updated 3 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,518Updated last year
- Malware Configuration And Payload Extraction☆751Updated 3 months ago
- malware source codes☆551Updated 2 years ago
- A collection of malware samples caught by several honeypots i manage☆1,661Updated 3 years ago
- Personal research and publication on malware families☆137Updated 2 months ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,037Updated 11 months ago
- Indicators from Unit 42 Public Reports☆706Updated last month
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆547Updated 4 months ago
- An open source script to perform malware static analysis on Portable Executable☆314Updated last year
- MBC content in markdown☆409Updated last month
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆567Updated this week
- yarGen is a generator for YARA rules☆1,606Updated 8 months ago
- Various snippets created during malware analysis☆458Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆575Updated 9 months ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆371Updated 2 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆449Updated 2 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆466Updated 3 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆614Updated 2 years ago
- A static analyzer for PE executables.☆1,046Updated last year
- YARA Rules I come across on the internet☆336Updated 10 months ago
- Malware exploits☆542Updated 5 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,733Updated last week
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code☆290Updated 4 years ago
- Repository of YARA rules made by Trellix ATR Team☆576Updated last year
- Malware Analyst's Cookbook stuffs☆154Updated 9 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆397Updated 7 months ago