Scripts, Yara rules and other files developed during malware investigations
☆27Aug 19, 2022Updated 3 years ago
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below
Sorting:
- Tracking APT IOCs☆25Nov 16, 2020Updated 5 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆121Mar 4, 2026Updated 2 weeks ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 3 years ago
- ☆13Oct 29, 2022Updated 3 years ago
- Go Lang Portable Executable Parser☆39Mar 31, 2021Updated 4 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Module for decompressing aPLib compressed data☆17Aug 25, 2022Updated 3 years ago
- Notes and IoCs of fresh malware☆62Jul 5, 2024Updated last year
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- Ida Pro plugin to aid in reverse engineering Rust binaries.☆19Dec 9, 2024Updated last year
- ☆41Apr 5, 2025Updated 11 months ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Reverse engineered source code of the autochk rootkit☆210Nov 1, 2019Updated 6 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34May 21, 2019Updated 6 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆64Apr 8, 2024Updated last year
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆39Apr 27, 2025Updated 10 months ago
- Code snips and notes☆141Mar 10, 2022Updated 4 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆48Jun 5, 2022Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- ☆35Dec 21, 2023Updated 2 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- ☆76Nov 30, 2023Updated 2 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Mar 13, 2026Updated last week
- ☆215Jun 5, 2025Updated 9 months ago