ytisf / theZooLinks
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
☆11,899Updated last year
Alternatives and similar repositories for theZoo
Users that are interested in theZoo are comparing it to the libraries listed below
Sorting:
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,339Updated 3 weeks ago
- The pattern matching swiss knife☆8,804Updated this week
- An advanced memory forensics framework☆7,704Updated 3 weeks ago
- A collection of malware samples caught by several honeypots i manage☆1,700Updated 3 years ago
- Defund the Police.☆12,631Updated 11 months ago
- Repository of yara rules☆4,410Updated last year
- Course materials for Malware Analysis by RPISEC☆3,867Updated 2 years ago
- Automated Adversary Emulation Platform☆6,173Updated 2 weeks ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,552Updated this week
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,695Updated 3 years ago
- A curated list of awesome YARA rules, tools, and people.☆3,819Updated 2 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,835Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10,615Updated this week
- an awesome list of honeypot resources☆9,378Updated 2 months ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,751Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,618Updated this week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,376Updated 4 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,621Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,329Updated last month
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,240Updated 8 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,557Updated last year
- Defeating Windows User Account Control☆6,779Updated 2 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,207Updated 4 months ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,055Updated 3 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,278Updated last year
- Loki - Simple IOC and YARA Scanner☆3,552Updated 6 months ago
- CTF framework and exploit development library☆12,635Updated last month
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,561Updated last month
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,357Updated this week
- APT & CyberCriminal Campaign Collection☆3,900Updated 10 months ago