There are 357 repositories under malware topic.
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
Collection of malware source code for a variety of platforms in an array of different programming languages.
A collection of hacking / penetration testing resources to make you better!
The Rogue Access Point Framework
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
An advanced memory forensics framework
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
A True Instrumentable Binary Emulation Framework
Android virtual machine and deobfuscator
DNS-Blocklists: For a better internet - keep the internet clean!
Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
ipsets dynamically updated with firehol's update-ipsets.sh script
Awesome hacking is an awesome collection of hacking tools.
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
Let's make an annoyance free, better open internet, altogether!
Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage
Volatility 3.0 development
Interesting APT Report Collection And Some Special IOC
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
A list of cyber-chef recipes and curated links
Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources
Malware Configuration And Payload Extraction
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
A collection of malware samples caught by several honeypots i manage
library for importing functions from dlls in a hidden, reverse engineer unfriendly way