Malware Analysis for Malware
Tools and techniques for analyzing, reverse-engineering, and understanding malicious software. Task: Malware
Explore 21 curated tools and resources
RELATED TASKS
LATEST ADDITIONS
A GitHub repository for fuzzing and testing file formats
A collection of Yara rules for identifying malicious PEs with unique or suspicious PDB paths.
A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.
A collection of Android Applications with malware analysis results
Largest open collection of Android malware samples, with 298 samples and contributions welcome.
A simple framework for extracting actionable data from Android malware
UDcide provides an alternative approach to dealing with Android malware by targeting specific behaviors for removal.
Explores malware interaction with Windows API and methods for detection and prevention.
Identifies 137 malicious npm packages and gathers system information to a remote server.
Repository of scripts, signatures, and IOCs related to various malware analysis topics.
Platform for uploading, searching, and downloading malware samples.
TeamTNT is modifying its malicious shell scripts after they were made public by security researchers.
A detailed analysis of malicious packages and how they work
PINNED
InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.