Malware

Explore 63 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
ThreatSTOP Protective DNS Logo

DNS-layer threat blocking service with real-time threat intelligence feeds

0
OPSWAT MetaDefender InSights C2 Logo

Real-time C2 infrastructure detection and disruption threat intelligence feed

0
Fortra SWG Logo

Cloud-native secure web gateway for web traffic inspection and threat protection

0
NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

0
Malware Patrol Enterprise Threat Intelligence Logo

A threat intelligence service providing actionable IoCs and security data feeds to help organizations detect, block, and respond to cyber threats.

0
Cloudflare Cloud Email Security Logo

Cloudflare Cloud Email Security is a cloud-based email protection service that safeguards organizations against phishing, malware, spam, and other email-borne threats through integrated threat detection and prevention capabilities.

0
Trustwave MailMarshal Logo

An AI-powered email security platform that provides multi-layered protection against phishing, malware, and other email-based threats through various deployment options.

0
fuzz.txt Logo

A GitHub repository for fuzzing and testing file formats

0
CrowdFMS Logo

CrowdFMS is a CrowdStrike framework that automates malware sample collection from VirusTotal using YARA rule-based notifications and the Private API system.

0
Infosec/hacking videos recorded by Cooper (@Ministraitor) Logo

Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)

1
YaraHunter Logo

YaraHunter scans container images, running Docker containers, and filesystems using YARA rules to detect malware indicators and signs of compromise.

0
Malware Patrol Logo

Malware Patrol offers a range of threat intelligence solutions, including enterprise data feeds, DNS firewall, phishing threat intelligence, and small business protection.

0
yara-rules Logo

A repository of YARA rules for identifying and classifying malware through pattern-based detection.

0
Android Malware Genome Project Logo

A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.

0
Quad9 Logo

A free DNS recursive service that blocks malicious host names and protects user privacy.

0
lw-yara Logo

A Yara ruleset designed to detect PHP shells and other webserver malware for malware analysis and threat detection.

0
MalShare.com Logo

A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.

0
Security Datasets Logo

Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.

0
AndroZoo Logo

A collection of Android Applications with malware analysis results

0
Android Malware Samples Logo

Largest open collection of Android malware samples, with 298 samples and contributions welcome.

0
Maldrolyzer Logo

A simple framework for extracting actionable data from Android malware

0
Comodo Advanced Endpoint Protection Logo

Advanced Endpoint Protection is a complete endpoint protection platform that provides advanced threat protection against ransomware, data breaches, and malware.

0
UDcide Logo

UDcide is an Android malware analysis tool that detects and removes specific malicious behaviors from malware samples while preserving the binary for investigation purposes.

0
Binary Defense IP Banlist Logo

A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.

0