Defund the Police.
☆13,686Jun 7, 2024Updated last year
Alternatives and similar repositories for awesome-malware-analysis
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of tools for incident response☆8,991Jul 18, 2024Updated last year
- A curated list of Awesome Threat Intelligence resources☆10,116Jan 19, 2026Updated 3 months ago
- an awesome list of honeypot resources☆10,250Apr 1, 2025Updated last year
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,962Apr 1, 2026Updated 3 weeks ago
- A collection of awesome penetration testing resources, tools and other shiny things☆25,978Jan 25, 2026Updated 3 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Course materials for Malware Analysis by RPISEC☆4,017Aug 26, 2022Updated 3 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14,260Jan 11, 2026Updated 3 months ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,490Jul 22, 2024Updated last year
- A curated list of awesome Hacking tutorials, tools and resources☆16,189Jun 2, 2024Updated last year
- ⭐️ A curated list of awesome forensic analysis tools and resources☆5,018Apr 12, 2026Updated 2 weeks ago
- A curated list of awesome YARA rules, tools, and people.☆4,182Mar 16, 2026Updated last month
- A curated list of awesome reversing resources☆4,484Aug 19, 2023Updated 2 years ago
- 🐶 A curated list of Web Security materials and resources.☆13,314Feb 27, 2026Updated 2 months ago
- A collection of android security related resources☆9,366Apr 20, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,593Mar 20, 2026Updated last month
- Repository of yara rules☆4,759Apr 17, 2024Updated 2 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,982Updated this week
- A curated list of awesome infosec courses and training resources.☆5,639Nov 21, 2025Updated 5 months ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,806Apr 3, 2024Updated 2 years ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,575Jan 5, 2026Updated 3 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,541Jan 12, 2026Updated 3 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,954May 3, 2022Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,860Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- List of Awesome Red Teaming Resources☆7,888Dec 28, 2023Updated 2 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆3,377Sep 3, 2025Updated 7 months ago
- Various public documents, whitepapers and articles about APT campaigns☆3,646Jan 1, 2024Updated 2 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,257Jul 15, 2024Updated last year
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,256Updated this week
- APT & CyberCriminal Campaign Collection☆4,070Jul 25, 2024Updated last year
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,933Apr 1, 2026Updated 3 weeks ago
- A curated list of resources for learning about application security☆6,893Feb 22, 2025Updated last year
- The pattern matching swiss knife☆9,581Feb 10, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Loki - Simple IOC and YARA Scanner☆3,749Jan 12, 2026Updated 3 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,953Aug 17, 2020Updated 5 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,760Apr 16, 2026Updated last week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,973Apr 22, 2026Updated last week
- An advanced memory forensics framework☆8,005May 16, 2025Updated 11 months ago
- Main Sigma Rule Repository☆10,355Updated this week
- Empire is a PowerShell and Python post-exploitation agent.☆7,832Jan 19, 2020Updated 6 years ago