Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for information security malware research
information-security
x
malware-research
x
1 search results found
Malice
⭐
1,429
VirusTotal Wanna Be - Now with 100% more Hipster
Malware Exhibit
⭐
857
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
Fame
⭐
820
FAME Automates Malware Evaluation
Winappdbg
⭐
435
WinAppDbg Debugger
Malware Database
⭐
226
A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.
Assemblyline
⭐
157
AssemblyLine 4: File triage and malware analysis
Malware Feed
⭐
82
Bringing you the best of the worst files on the Internet.
Onenoteanalyzer
⭐
69
A C# based tool for analysing malicious OneNote documents
Kenyatta Ransomware
⭐
41
This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Proxy😎 -- Functionality is based on Cryptolocker😈 ransomware. Be cool😉
Kaal_bhairav
⭐
40
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.
Malware Sample Sources
⭐
27
Malware Sample Sources
Shady Hook
⭐
27
Proof of Concept - Hooking API calls of a Ransomware
Cybersecurity Malware Analysis
⭐
22
A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.
Pyc2bytecode
⭐
14
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Defanger
⭐
12
Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.
Lnk2vbs
⭐
11
A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.
Invoke Mathfuscation
⭐
8
A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it
Related Searches
Python Information Security (361)
Penetration Testing Information Security (281)
Cybersecurity Information Security (252)
1-1 of 1 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.