There are 71 repositories under malware-detection topic.
Collection of malware source code for a variety of platforms in an array of different programming languages.
A curated list of awesome YARA rules, tools, and people.
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.
a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
ReversingLabs YARA Rules
APK/DEX detector for Windows, Linux and MacOS.
Linker/Compiler/Tool detector for Windows, Linux and MacOS.
Malware Sample Sources
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
FCL (Fileless Command Lines) - Known command lines of fileless malicious executions
An open source framework for enterprise level automated analysis.
Collection of private Yara rules.
Awesome graph anomaly detection techniques built based on deep learning frameworks. Collections of commonly used datasets, papers as well as implementations are listed in this github repository. We also invite researchers interested in anomaly detection, graph representation learning, and graph anomaly detection to join this project as contributors and boost further research in this area.
Bringing you the best of the worst files on the Internet.
Anti-Malware for minecraft
AssemblyLine 4: File triage and malware analysis
Anti-malware for Android using machine learning
Personal compilation of APT malware from whitepaper releases, documents and own research
Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results
Android app analysis and feature extraction library
This repository contains indicators of compromise (IOCs) of our various investigations.
Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities
stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Samples,Fanny Added in another repo.
A curated list of awesome malware persistence tools and resources.