Defund the Police.
☆13,769Jun 7, 2024Updated last year
Alternatives and similar repositories for awesome-malware-analysis
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of tools for incident response☆9,039May 6, 2026Updated 2 weeks ago
- A curated list of Awesome Threat Intelligence resources☆10,195Jan 19, 2026Updated 4 months ago
- an awesome list of honeypot resources☆10,287Apr 1, 2025Updated last year
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆13,014Apr 1, 2026Updated last month
- A collection of awesome penetration testing resources, tools and other shiny things☆26,149Jan 25, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Course materials for Malware Analysis by RPISEC☆4,023Aug 26, 2022Updated 3 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14,338Jan 11, 2026Updated 4 months ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,535Jul 22, 2024Updated last year
- A curated list of awesome Hacking tutorials, tools and resources☆16,325Jun 2, 2024Updated last year
- ⭐️ A curated list of awesome forensic analysis tools and resources☆5,049Apr 12, 2026Updated last month
- A curated list of awesome YARA rules, tools, and people.☆4,194Mar 16, 2026Updated 2 months ago
- A curated list of awesome reversing resources☆4,491Aug 19, 2023Updated 2 years ago
- 🐶 A curated list of Web Security materials and resources.☆13,362Updated this week
- A collection of android security related resources☆9,413May 11, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,679Apr 28, 2026Updated 3 weeks ago
- Repository of yara rules☆4,788Apr 17, 2024Updated 2 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆4,025Updated this week
- A curated list of awesome infosec courses and training resources.☆5,661Nov 21, 2025Updated 5 months ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,813Apr 3, 2024Updated 2 years ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,598Jan 5, 2026Updated 4 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,956May 3, 2022Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,959May 12, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- List of Awesome Red Teaming Resources☆7,916Dec 28, 2023Updated 2 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆3,382Sep 3, 2025Updated 8 months ago
- Various public documents, whitepapers and articles about APT campaigns☆3,654Jan 1, 2024Updated 2 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,294Jul 15, 2024Updated last year
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,290Updated this week
- APT & CyberCriminal Campaign Collection☆4,082Jul 25, 2024Updated last year
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,962Apr 1, 2026Updated last month
- A curated list of resources for learning about application security☆6,910Feb 22, 2025Updated last year
- The pattern matching swiss knife☆9,614May 7, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Loki - Simple IOC and YARA Scanner☆3,753Jan 12, 2026Updated 4 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,981Aug 17, 2020Updated 5 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆6,002May 12, 2026Updated last week
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,822Apr 16, 2026Updated last month
- An advanced memory forensics framework☆8,007May 16, 2025Updated last year
- Main Sigma Rule Repository☆10,451Updated this week
- Empire is a PowerShell and Python post-exploitation agent.☆7,836Jan 19, 2020Updated 6 years ago