☆28Apr 18, 2016Updated 9 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- ☆45Jun 16, 2017Updated 8 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 4 months ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Sep 28, 2017Updated 8 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- OUTDATED☆11Mar 8, 2020Updated 6 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Small scripts and POCs related to digital forensics☆18Nov 1, 2022Updated 3 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- Copy of the libewf source code that is configured for a 64-bit MS Visual Studio build.☆17Aug 17, 2020Updated 5 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Nov 2, 2013Updated 12 years ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- A collection of Yara rules I have created so far☆16Oct 26, 2020Updated 5 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- Simple and old virtual machine☆17Apr 28, 2016Updated 9 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- ☆28Nov 20, 2025Updated 4 months ago
- A Python parser for Rich Headers☆15Jun 2, 2015Updated 10 years ago
- Пример руткита для ядра линукс 5☆19Dec 4, 2020Updated 5 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 8 months ago
- Xbox Adaptive Controller Joystick Splitter☆12Nov 30, 2018Updated 7 years ago