#MALWARE

Blog from Steve S. I'm Steve S., I have a Bachelor's degree in Cyber Operations and am currently enrolled in Georgia Tech's OMS in Cybersecurity - Information Security Track graduate program. I have a passion for offensive security topics and continue to sharpen my skills through courses, CTFs, and personal research.

Malware Analysis, News and Indicators.

A mix of in-depth nuanced takes on current events and highly technical original research by Marcus Hutchins. I cover a wide array of topics such as vulnerability research, threat intelligence, national security, reverse engineering, and Windows internals.

World First Visual AI Based Malware Detection. The first solution that converts files into graphical representations and checks whether malware is contained or not. We provide user-friendly, efficient and secure malware detection technology.

Blog from cocomelonc, a cybersec enthusiast, CTF player.

The Intelligence and research arm of Check Point Technologies provides leading cyber threat intelligence to Check Point customers and the greater intelligence community.

HackMag is an educational ecosystem where cybersecurity specialists share practical knowledge in exchange for financial rewards and recognition. Access to this knowledge significantly increases the hands-on educational level of fellow specialists and the security of computer systems throughout the world.

MalwareMustDie (MMD) is a prominent nonprofit whitehat security research group that emerged in August 2012, standing as a collective force against the proliferation of malware on the internet. The organization comprises a collaborative effort of IT professionals and dedicated security researchers, united by a shared mission to combat and mitigate the impact of various forms of malicious software.

Malpedia is a free service offered by Fraunhofer FKIE. The primary goal of Malpedia is to provide a resource for rapid identification and actionable context when investigating malware. Openness to curated contributions shall ensure an accountable level of quality in order to foster meaningful and reproducible research.

Real Intrusions by Real Attackers, The Truth Behind the Intrusion.

Practical and Affordable Cyber Security Training.

Online Virus Scanner Without Result Distribution. Scan your file online with multiple different antiviruses without distributing the results of your scan.

A free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology.

List of evasion techniques provided by Check Point Research.

29 year old cybersecurity specialist, speaker, and ex-hacker. Best known for stopping the global WannaCry ransomware attack. Background in programming & threat intelligence.

A global community of people helping each other with their Security, Technology and Technical Support questions.

It is the golden age of Command and Control (C2) frameworks. The goal of this site is to point you to the best C2 framework for your needs based on your adversary emulation plan and the target environment. Take a look at the matrix or use the questionnaire to determine which fits your needs.

Get up-to-date hot takes on the state of cybersecurity today, from responses to US-CERT alerts, to using the MITRE ATT&CK framework.

The largest collection of malware source code, samples, and papers on the internet.

Upload a ransom note and/or sample encrypted file to identify the ransomware that has encrypted your data.

A community driven public malware repository that works to provide free access to malware samples and tooling to the infomation security community.

The Official Blog from Kaspersky covers information to help protect you against viruses, spyware, hackers, spam & other forms of malware.

Interactive Online Malware Sandbox.

Dark Vortex provides various cybersecurity trainings, products and other services.

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Scan, Track, Secure Proactive C&C Infrastructure Monitoring Across the Web.

Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.

Cybersecurity, red team, blue team, hacking.

Malcore is designed to automate malware analysis and was designed by Internet 2.0’s top malware analysts Thomas Perkins. Malcore’s sandbox powered by AI is designed with speed and scalability. Malcore automates malware analysis, checks files and links.

MalAPI.io maps Windows APIs to common techniques used by malware.

The EMBER dataset is a collection of features from PE files that serve as a benchmark dataset for researchers. The EMBER2017 dataset contained features from 1.1 million PE files scanned in or before 2017 and the EMBER2018 dataset contains features from 1 million PE files scanned in or before 2018. This repository makes it easy to reproducibly train the benchmark models, extend the provided feature set, or classify new PE files with the benchmark models.