☆44Aug 16, 2018Updated 7 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- ☆32Jun 19, 2024Updated last year
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 8 years ago
- SMTP server / sinkhole for collecting spam☆46Jul 30, 2018Updated 7 years ago
- Stana - A strace output parser and analyser☆32Aug 21, 2018Updated 7 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- ☆43Nov 5, 2018Updated 7 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- 恶意代码分析学习笔 记☆10Dec 29, 2015Updated 10 years ago
- Your bag of handy codes for malware researchers☆120Mar 20, 2020Updated 5 years ago
- CAPE core and community parsers☆18Feb 9, 2026Updated 3 weeks ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- ☆14Feb 19, 2021Updated 5 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- awesome list of browser exploitation tutorials☆13Sep 21, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Awesome VirusTotal Intelligence Search Queries☆332May 16, 2023Updated 2 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Jun 26, 2016Updated 9 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆35May 27, 2016Updated 9 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Static based decoders for malware samples☆94Jul 27, 2020Updated 5 years ago
- ☆15Jun 29, 2016Updated 9 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- ☆29May 4, 2016Updated 9 years ago
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 10 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆21Mar 30, 2018Updated 7 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 10 years ago
- A collection of anti disassembly techniques☆20Jul 22, 2017Updated 8 years ago
- ☆100Jun 19, 2024Updated last year
- grap: define and match graph patterns within binaries☆174Mar 3, 2021Updated 5 years ago
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago