Malware samples observed in the wild from time to time
☆12Jul 29, 2019Updated 6 years ago
Alternatives and similar repositories for malarchive
Users that are interested in malarchive are comparing it to the libraries listed below
Sorting:
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- ☆18Feb 4, 2016Updated 10 years ago
- 攻击Java Web应用-[Java Web安全]☆12Dec 10, 2019Updated 6 years ago
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- Some anti QEMU trick used by in-the-wild malware.☆14Aug 14, 2015Updated 10 years ago
- Socks5man is a Socks5 management tool and Python library☆12Mar 10, 2023Updated 3 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Emulator for Windows Malware Analysis☆15Feb 26, 2022Updated 4 years ago
- USB device management to prevent against BadUSB attacks☆24Oct 4, 2014Updated 11 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- ☆54Sep 6, 2020Updated 5 years ago
- My collection of unpackers for malware packers/crypters☆28Aug 24, 2017Updated 8 years ago
- HGAME2021 官方 + 校内参赛选手 Writeup☆16Mar 1, 2021Updated 5 years ago
- Malware (analysis results, tools, reference, analysis methods, etc.)☆16Apr 18, 2023Updated 2 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43May 26, 2019Updated 6 years ago
- ☆15May 6, 2021Updated 4 years ago
- Détecteur box vulnérables à la brèche PIN NULL☆13Sep 15, 2017Updated 8 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- A malware dataset curation tool which helps identify packed samples.☆33Oct 24, 2018Updated 7 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Analysis Correlation Engine☆23Feb 8, 2022Updated 4 years ago
- ☆20Mar 11, 2026Updated last week
- CVE-2020-5902☆10Jul 11, 2020Updated 5 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- sql盲注日志分析工具GUI版本☆16Feb 17, 2024Updated 2 years ago
- Let's Play Bingo - 2020 Edition☆21Jul 19, 2023Updated 2 years ago
- Code snippets from my Youtube channel https://www.youtube.com/channel/UCJW25d8mW8ciz0DQC-5XNsQ☆17Mar 21, 2021Updated 4 years ago
- Flask File Upload with dropzone.js.☆23Apr 27, 2014Updated 11 years ago
- A mapping of used malware names to commonly known family names☆63Feb 21, 2023Updated 3 years ago
- Live Dangerous Linux Malware Samples!☆22May 5, 2020Updated 5 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Updated this week