User Experience on mobile might not be great yet, but I'm working on it.

Your first time on this page? Allow me to give some explanations.

Awesome Malware Analysis

Defund the Police.

Here you can see meta information about this topic like the time we last updated this page, the original creator of the awesome list and a link to the original GitHub repository.

Last Update: None

Thank you rshipp & contributors
View Topic on GitHub:
rshipp/awesome-malware-analysis

Search for resources by name or description.
Simply type in what you are looking for and the results will be filtered on the fly.

Further filter the resources on this page by type (repository/other resource), number of stars on GitHub and time of last commit in months.

Anonymizers

A free, web based anonymizer.

OpenVPN is an open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol that utilizes SSL/TLS for key exchange.

An open source proxy server with some

Enable anonymous communication. ![Open-Source Software][oss icon] ![Freeware][freeware icon]

Honeypots

ICS/SCADA honeypot

847
334
8m
GPL-2.0

Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io

3.5K
646
8m
n/a

Distributed Honeypot

37
5
3y 5m
MIT

Home of the dionaea honeypot

486
134
8m
GPL-2.0

Web Application Honeypot

444
169
2y 40d
n/a

Advanced Honeypot framework.

925
151
10m
n/a

Modern Honey Network

2.06K
592
1y 92d
n/a

Normalizer for honeypot data.

40
37
7y 5m
GPL-3.0

Python low-interaction honeyclient

814
193
8m
GPL-2.0

Create a virtual honeynet.

Honeypot bundle Linux distro.

Malware Corpora

Collection of almost 40.000 javascript malware samples

360
150
2y 12d
n/a

Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus products, collecting malware for another analyzer/zoo.

78
22
6y 80d
n/a

A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.

6.71K
1.85K
10m
n/a

NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.

1.04K
662
7y 8m
n/a

Malware samples collection and analysis.

Evergrowing searchable corpus of malicious Microsoft documents.

Large repository of malware actively

Agregator for malware corpus tracker

Community-Based malware repository and social network.

Malware database that detected by

Malware repository, registration

Active collection of malware samples.

Massive and growing collection of free malware samples.

Tools

A framework for receiving and redistributing abuse feeds

102
16
2y 28d
MIT

Tool to gather Threat Intelligence indicators from publicly available sources

604
171
5y 91d
GPL-3.0

A modular Python application to pull intelligence about malicious files

97
21
10m
n/a

A modular Python application to collect intelligence for malicious hosts.

211
46
1y 7m
n/a

Defanged Indicator of Compromise (IOC) Extractor.

295
64
1y 107d
GPL-2.0
161
54
3y 10m
Apache-2.0

Malware/IOC ingestion and processing engine

91
21
2y 11m
GPL-3.0

DEPRECATED - USE v3 (bearded-avenger)

223
65
3y 9m
LGPL-3.0

MISP (core software) - Open Source Threat Intelligence and Sharing Platform (formely known as Malware Information Sharing Platform)

3.08K
956
8m
AGPL-3.0

Python OpenIOC Editor

16
5
5y 10m
n/a

Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc.

71
24
5y 8m
MIT

Extract and aggregate threat intelligence.

432
85
8m
GPL-2.0

ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a set of Google Custom Search Engines.

51
8
6y 7m
n/a

Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds

147
37
6y 7d
GPL-3.0

Free, community-driven threat intelligence platform collecting IOCs from open-source feeds.

Research, connect, tag and

TC Open allows you to see and

A search engine for threats,

Other Resources

FireEye Publicly Shared Indicators of Compromise (IOCs)

410
98
5y 4m
Apache-2.0

Honeynet Project generic authenticated datafeed protocol

193
102
8m
GPL-3.0

Repository of yara rules

2.46K
664
8m
GPL-2.0

Your Everyday Threat Intelligence

1.02K
223
10m
Apache-2.0

AutoShun is a Snort plugin that allows you to send your Snort IDS logs to a centralized server that will correlate attacks from your sensor logs with other snort sensors, honeypots, and mail filters from around the world.

list](http://cinsscore.com/list/ci-badguys.txt)) -

Multiple botnet active tracker.

Analytics for 350+ IP lists

Community driven honeypot sensor data collection and aggregation.

IPs](https://infosec.cert-pa.it/analyze/listip.txt) - Domains - URLs) - Blocklist service.

Continuous aggregation of IOCs from a variety of open reputation sources.

Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.

Searchable incident database.

Framework for sharing threat intelligence.

SystemLookup hosts a collection of lists that provide information on

Data mining portal for threat

Search for indicators, up to 1000

Detection and Classification

Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.

169
36
7y 9m
n/a

BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.

1.12K
155
1y 9m
Apache-2.0

The FLARE team's open-source tool to identify capabilities in executable files.

1.43K
169
8m
Apache-2.0

Program for determining types of files for Windows, Linux and MacOS.

2.09K
308
8m
MIT

File Scanning Framework

228
46
2y 9m
Apache-2.0

Automated static analysis tools for binary programs

949
140
8m
n/a

A Single Library Parser to extract meta information,static analysis and detect macros within the files.

13
6
3y 41d
MIT
511
110
3y 48d
n/a

HashCheck Shell Extension for Windows with added SHA2, SHA3, and multithreading; originally from code.kliu.org

1.07K
128
5y 48d
n/a

Loki - Simple IOC and Incident Response Scanner

1.85K
426
9m
GPL-3.0

Malware Analysis Tool using Function Level Fuzzy Hashing

179
34
5y 10m
LGPL-2.1

A static analyzer for PE executables.

688
139
8m
GPL-3.0

Malware static analysis framework

140
41
6y 33d
n/a

Modular file scanning/analysis framework

495
120
2y 9m
MPL-2.0

Linker/Compiler/Tool detector for Windows, Linux and MacOS.

143
42
8m
MIT

Checks with NSRL RDS servers looking for for hash matches

86
9
2y 29d
ISC

PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.

468
132
11m
n/a

Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness

325
69
2y 5m
Apache-2.0

Android Malware (Analysis | Scoring System)

482
62
8m
GPL-3.0

yarGen is a generator for YARA rules

783
170
9m
n/a

Simple tool to find the yara matches on a file

17
4
3y 59d
MIT

Local Linux rootkit detection.

Open source antivirus engine.

Packer, compressor detector, unpack

PEV

A multiplatform toolkit to work with PE

A Rootkit Hunter for Linux

Pattern matching tool for

Online Scanners and Sandboxes

Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant

170
17
1y 7m
MPL-2.0

Modified edition of cuckoo

247
103
2y 46d
n/a

A Python library to interface with a cuckoo-modified instance

15
3
4y 11m
n/a

The Multiplatform Linux Sandbox

217
63
3y 45d
MIT

DRAKVUF Black-box Binary Analysis

623
179
8m
n/a

HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis and security assessment on the Linux system.

620
214
2y 12d
n/a

Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time indicators of Linux malware. It allows one to inspect Linux malware before execution, during execution, and after execution (post-mortem analysis) by performing static, dynamic and memory analysis using open source tools

319
110
5y 7m
GPL-3.0

A Tool for Automatic Analysis of Malware Behavior

314
92
2y 5m
GPL-3.0

VirusTotal Wanna Be - Now with 100% more Hipster

1.25K
225
2y 7m
Apache-2.0

A Python RESTful API framework for online malware analysis and threat intelligence services.

306
82
1y 7m
n/a

Noriben - Portable, Simple, Malware Analysis Sandbox

780
198
1y 4m
n/a

Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.

118
39
7y 12m
n/a

Minimal, consistent Python API for building integrations with malware sandboxes.

96
31
10m
GPL-2.0

Sandboxed Execution Environment

762
97
1y 19d
Apache-2.0

A Python library and command line tools to provide interactive log visualization.

128
34
4y 11m
n/a

Online interactive sandbox.

Free online analysis of APKs

Malware.lu online scanner and

Analyze suspicious office documents.

Open source, self hosted

Multi-format file analyzer with

Unpacks, scans and analyzes almost any

Detect, analyze, and categorize malware by

An asynchronous and customizable

Deep malware analysis with Joe Sandbox.

Free online multi-AV scanner.

Extract, decode and display online

Online malware anomaly-based static analyser with heuristic detection engine powered by data mining and machine learning.

Free analysis with an online Cuckoo Sandbox

PacketTotal is an online engine for analyzing .pcap files, and visualizing the network traffic within.

Analyse suspicious PDF files.

A graphical malware analysis tool kit.

Online dropper analysis (Js, VBScript, Microsoft Office, PDF).

VirusTotal, a subsidiary of Google, is a free online service that analyzes files and URLs enabling the identification of viruses, worms, trojans and other kinds of malicious content detected by antivirus engines and website scanners. At the same time, it may be used as a means to detect false positives, i.e. innocuous resources detected as malicious by one or more scanners.

Domain Analysis

A tool designed for consistent and safe capture of off network web resources.

33
4
4y 7m
Apache-2.0

Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation

2.74K
513
8m
n/a

Searches various online resources to try and get as much info about an IP/domain as possible.

78
25
7y 9m
n/a

Machinae Security Intelligence Collector

439
96
11m
MIT

Cross-language temporary (disposable/throwaway) email detection library. Covers 33600 fake email providers.

1.24K
162
9m
MIT

A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to speed up resolutions.

66
20
5y 11m
n/a

AbuseIPDB is a project dedicated

Community based IP blacklist service.

Threat intelligence tracker, with IP/domain/hash

One click tool to retrieve as

Dig

Free online dig and other

Multiple DNS blacklist and forward

Phishing Statistics with search for IP, domain and website title.

Spyse is an OSINT search engine that provides fresh data about the entire web. All the data is stored in its own DB for instant access and interconnected with each other for flexible search.

Historical and current WHOIS,

IP based spam block list.

A project from abuse.ch with the goal

Free URL Scanner.

Free URL Scanner & domain information.

DomainTools free online whois

Zulu URL Risk Analyzer.

Browser Malware

A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)

11.9K
852
1y 90d
GPL-3.0

Parses Java Cache IDX files

38
9
3y 7m
n/a

Automatically exported from code.google.com/p/jsunpack-n

141
58
6y 6m
GPL-2.0

Java decompiler, assembler, and disassembler

1.29K
153
1y 4m
GPL-3.0

Robust ABC (ActionScript Bytecode) [Dis-]Assembler

384
86
8m
GPL-3.0

Firefox extension for web development.

Decompile and inspect Java apps.

Collection of utilities to work with SWF files.

Documents and Shellcode

Tool to help analyze PDF files

144
37
7y 5m
n/a

A tool for studying JavaScript malware.

439
74
1y 42d
MIT

Builds json representation of PDF malware sample

42
14
10y 6m
MIT

Lite version of PDF X-RAY that uses no backend

30
7
9y 11m
n/a

Disassembler for analyzing

Upload common malware lures for Deep File Inspection and heuristical analysis.

Library and tools for x86 shellcode

QuickSand is a compact C framework

File Carving

This is the development tree. For downloads please see:

496
117
1y 6d
n/a

EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.

133
19
2y 7m
Apache-2.0

Hachoir is a Python library to view and edit a binary stream field by field

383
51
8m
GPL-2.0

Scalpel is an open source data carving tool.

442
82
7y 23d
Apache-2.0

Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.

63
28
1y 9m
n/a

Extract particular kind of files using headers.

Deobfuscation

.NET deobfuscator and unpacker.

4.93K
1.6K
1y 56d
GPL-3.0

FireEye Labs Obfuscated String Solver - Automatically extract obfuscated strings from malware.

1.77K
294
8m
Apache-2.0

Tool to help guess a files 256 byte XOR key by using frequency analysis

63
18
3y 4m
n/a

C++ application that uses memory and code hooks to detect packers

231
70
3y 7m
GPL-2.0

PyInstaller Extractor

245
96
8m
GPL-3.0

A cross-version Python bytecode decompiler

2.06K
244
9m
GPL-3.0

Automatic and platform-independent unpacker for Windows binaries based on emulation

257
45
11m
GPL-2.0

Automated malware unpacker

94
23
5y 7m
n/a

unXOR will search a XORed file and try to guess the key using known-plaintext attacks.

97
17
1y 6m
Apache-2.0

Reverse engineering tool for virtualization wrappers

48
10
2y 63d
n/a

A tool to analyze multi-byte xor cipher

979
143
1y 22d
n/a

Debugging and Reverse Engineering

A powerful and user-friendly binary analysis platform!

4.85K
793
8m
BSD-2-Clause

Identifies and extracts information from bots and other malware

138
27
5y 10m
MIT

Binary Analysis Platform

1.38K
221
8m
MIT

BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework

1.27K
169
1y 11m
BSD-2-Clause

BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.

2.71K
469
1y 1d
Apache-2.0

Firmware Analysis Tool

7.09K
1.08K
8m
MIT

BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, TIFS 2020)

62
16
1y 4m
LGPL-3.0

Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.

4.74K
1.15K
10m
n/a

Web based code browser using clang to provide basic code analysis.

39
5
4y 97d
n/a

Free and Open Source Reverse Engineering Platform powered by rizin

8.95K
709
8m
GPL-3.0

DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.

613
166
8m
GPL-3.0

.NET debugger and assembly editor

17.48K
2.97K
10m
n/a

A modern tool for the Windows kernel exploration and tracing

1.1K
128
8m
n/a

GEF - GDB Enhanced Features for exploit devs & reversers

3.46K
489
8m
MIT

Ghidra is a software reverse engineering (SRE) framework

24.85K
3.35K
8m
Apache-2.0

hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols

149
16
3y 110d
n/a

Interactive Delphi Reconstructor

490
148
9m
MIT
62
18
3y 33d
MIT

Deprecated repo for PANDA 1.0 – see PANDA 2.0 repository

87
37
4y 10m
n/a

PEDA - Python Exploit Development Assistance for GDB

4.46K
729
9m
n/a

Automated static analysis tools for binary programs

949
140
8m
n/a

Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.

2.91K
302
2y 7m
GPL-3.0

Official repository for Pyew.

319
92
2y 49d
GPL-2.0

Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU

1.44K
237
1y 88d
GPL-2.0
30
7
1y 53d
n/a

ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.

268
46
5y 5m
LGPL-2.1

Imports Reconstructor

592
157
2y 9m
GPL-3.0

Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide

1.84K
223
9m
GPL-3.0

Sublime Malware Research Tool

57
13
5y 9m
n/a

A machine learning tool that ranks strings based on their relevance for malware analysis.

462
80
10m
Apache-2.0

Disassembler Library for x86 and x86-64

751
253
6y 10m
BSD-2-Clause
632
144
1y 52d
n/a

Binary analysis framework.

Free-of-charge standalone tool based on ReSharper's bundled decompiler. It can reliably decompile any .NET assembly into equivalent C# or IL code. It can create Visual Studio solutions based on the original binary files in a straight-forward way. [Proprietary] [Free]

The macOS and Linux Disassembler.

ILSpy is the open-source .NET assembly browser and decompiler.

DSL for file formats / network protocols /

LIEF provides a cross-platform library

Dynamic analysis for Linux executables.

An assembly-level debugger for Windows

Perform static analysis of Windows

A Professional PE file Explorer for

Discover which program has a particular file or directory open. Process Explorer shows you information about which handles and DLLs processes have opened or loaded.

Excellent full blown task manager.

A sysinternal tool shows real-time file system, Registry, network and process/thread activity. ![Freeware][freeware icon]

Reverse engineering framework, with

Retargetable machine-code decompiler with an

A dynamic binary analysis (DBA) framework.

multipurpose debugger for the Microsoft Windows computer operating system, used to debug user mode applications, device drivers, and the kernel-mode memory dumps.

Network

integrating bro into yara

30
4
6y 10m
n/a

Malicious HTTP traffic explorer

648
161
1y 22d
GPL-3.0

Protocol Analysis/Decoder Framework

441
111
2y 6m
n/a

[Suspended] FakeNet-NG - Next Generation Dynamic Network Analysis Tool

1.21K
271
11m
Apache-2.0

Botnet command & control monitor

146
61
4y 6d
n/a

Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.

71
29
1y 9m
n/a

Laika BOSS: Object Scanning System

678
153
3y 44d
Apache-2.0

Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files) and Zeek logs.

51
8
8m
n/a

Malcom - Malware Communications Analyzer

988
204
3y 11m
n/a

Malicious traffic detection system

3.92K
752
8m
MIT

Arkime (formerly Moloch) is an open source, large scale, full packet capturing, indexing, and database system.

4.62K
860
8m
n/a

ngrep is like GNU grep applied to the network layer. It's a PCAP-based tool that allows you to specify an extended regular or hexadecimal expression to match against data payloads of packets. It understands many kinds of protocols, including IPv4/6, TCP, UDP, ICMPv4/6, IGMP and Raw, across a wide variety of interface types, and understands BPF filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.

546
74
2y 9m
n/a

Visualize network topologies and collect graph statistics based on pcap files

246
57
1y 9m
n/a

An ICAP Server with yara scanner for URL and content.

48
12
4y 8m
n/a

analyze a web-based network traffic 🕶 to detect central command and control servers

72
24
3y 117d
n/a

Bro

Protocol analyzer that operates at incredible

Web-based tool for packet analysis

The free web debugging proxy for any browser, system or platform

An open source security oriented

Network service emulation, useful when

Interactive intercepting HTTP proxy for penetration testers and software developers. ![Open-Source Software][OSS Icon] ![Freeware][Freeware Icon]

Packet analyzer for network traffic capture.

Trach and reassemble TCP streams

Extract files from network

A network protocol analyzer. ![Open-Source Software][oss icon] ![Freeware][freeware icon]

Memory Forensics

Differential Analysis of Malware in Memory

182
52
4y 6m
GPL-2.0

Web interface for the Volatility Memory Forensics Framework

239
39
3y 11m
n/a

inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques

237
53
3y 11m
AGPL-3.0

A short and small memory forensics helper.

41
7
4y 7d
n/a

Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to find badness.

45
8
8y 32d
n/a

VolDiff: Malware Memory Footprint Analysis based on Volatility

177
49
4y 43d
BSD-2-Clause

An advanced memory forensics framework

4.3K
917
10m
GPL-2.0

Web App for Volatility framework

320
83
4y 9m
GPL-3.0

WinDBG Anti-RootKit Extension

445
157
3y 8m
n/a

Memory analysis framework,

Windows Artifacts

Windows Live Artifacts Acquisition Script

144
27
9m
GPL-2.0

Pure Python parser for classic Windows Event Log files (.evt)

29
9
6y 19d
Apache-2.0

Storage and Workflow

An Open Source Malware Analysis Pipeline System

135
52
1y 7m
n/a

A warehouse for your malware

116
43
8y 5m
n/a

Collaborative malware analysis framework

307
56
3y 6m
n/a

Collaborative Research Into Threats, a

Distributed content analysis

A binary management and analysis framework for

Miscellaneous

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

2.75K
728
8m
GPL-2.0

Cryptographic Dataset Generation & Modelling Framework

23
10
1y 6m
Apache-2.0
2.21K
378
1y 93d
Apache-2.0

Malware exploits

464
197
2y 56d
n/a

A simple tool to organise large malicious/benign files into a organised Structure.

10
4
3y 36d
MIT

Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.

1.68K
331
2y 8m
GPL-3.0

Based on Debian.

Linux distribution designed to support your DFIR investigations, malware analysis and OSINT (Open Source INTelligence) activities.

Linux distribution for mobile

Books

Learning Malware Analysis: Explore the concepts, tools, and techniques to analuze and investigate Windows malware

Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercime, and IoT attacks

Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

Other

Related Awesome Lists

A collection of android security related resources

5.14K
1.2K
10m
Apache-2.0

A curated list of resources for learning about application security

4.43K
541
2y 73d
MIT

A curated list of CTF frameworks, libraries, resources and softwares

5.47K
1.1K
1y 5m
CC0-1.0

A curated list of awesome forensic analysis tools and resources

1.37K
309
9m
CC0-1.0

A curated list of awesome Hacking tutorials, tools and resources

6.81K
1.21K
8m
MIT

an awesome list of honeypot resources

4.77K
898
8m
Artistic-2.0

A curated list of resources related to Industrial Control System (ICS) security.

825
303
10m
Apache-2.0

A curated list of tools for incident response

4.01K
992
8m
Apache-2.0

A curated list of awesome infosec courses and training resources.

3.31K
607
9m
n/a

A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.

2.13K
375
1y 5m
n/a

A collection of awesome penetration testing resources, tools and other shiny things

13.56K
3.48K
8m
n/a

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

6.56K
1.26K
11m
MIT

A curated list of Awesome Threat Intelligence resources

4.09K
938
10m
Apache-2.0

A curated list of awesome YARA rules, tools, and people.

1.35K
229
9m
n/a