Understanding malware is a critical component of Cybersecurity. This page contains links for applications, research papers, and resources to help security researchers and engineers better understand the threat malware poses to network systems. This information is intended for research and educational purposes only. If you are unfamiliar with the practices of malware analysis and forensics, please take the time to study the resources in the "Getting Started" section.
Note: This area of our site is under active construction.
Getting Started
Before you start working with malware, it is important to have a properly configured and secured sandbox environment. This helps prevent an unintentional system infection or release of malware from your testing environment. This set of resources can help get you set up to securely work with live malware samples and source code.
Getting Started
Before you start working with malware, it is important to have a properly configured and secured sandbox environment. This helps prevent an unintentional system infection or release of malware from your testing environment. This set of resources can help get you set up to securely work with live malware samples and source code.
Getting Started
Before you start working with malware, it is important to have a properly configured and secured sandbox environment. This helps prevent an unintentional system infection or release of malware from your testing environment. This set of resources can help get you set up to securely work with live malware samples and source code.
Getting Started
Before you start working with malware, it is important to have a properly configured and secured sandbox environment. This helps prevent an unintentional system infection or release of malware from your testing environment. This set of resources can help get you set up to securely work with live malware samples and source code.
Before you download or attempt to analyze malware samples, it is very important to create an environment where it can be safely handled and, if needed, quickly destroyed.
Utilities
In order to properly analyze and study malware you will need a suite of utilities and applications for doing so. These resources will help with analysis, detection, reverse engineering, and incident response.
Note: If you are not looking to personally perform analysis but need to have a malware sample analyzed, check out the Online Analysis Sites below.Utilities
In order to properly analyze and study malware you will need a suite of utilities and applications for doing so. These resources will help with analysis, detection, reverse engineering, and incident response.
Note: If you are not looking to personally perform analysis but need to have a malware sample analyzed, check out the Online Analysis Sites below.Utilities
In order to properly analyze and study malware you will need a suite of utilities and applications for doing so. These resources will help with analysis, detection, reverse engineering, and incident response.
Note: If you are not looking to personally perform analysis but need to have a malware sample analyzed, check out the Online Analysis Sites below.Utilities
In order to properly analyze and study malware you will need a suite of utilities and applications for doing so. These resources will help with analysis, detection, reverse engineering, and incident response.
Note: If you are not looking to personally perform analysis but need to have a malware sample analyzed, check out the Online Analysis Sites below.To install your test systems, it is necessary to have the installation images or ready-to-run virtual machine images.
- Windows Test System
- Linux Test System
- Windows Analysis System
- Kali Linux Analysis System
Malware
Once you are ready to begin working with malware, these resources will provide you with access to both live malware samples as well as the source code for thousands of different research specimens.
Malware
Once you are ready to begin working with malware, these resources will provide you with access to both live malware samples as well as the source code for thousands of different research specimens.
Malware
Once you are ready to begin working with malware, these resources will provide you with access to both live malware samples as well as the source code for thousands of different research specimens.
Malware
Once you are ready to begin working with malware, these resources will provide you with access to both live malware samples as well as the source code for thousands of different research specimens.
- Vortech Respositories - Vortech Consulting maintains a repository of malware, hosted in a github repository. This archive contains very old (DOS) viruses and a sampling of some world-famous malware.
- VX Underground - A massive repository of malware, research, and articles. At the time of this writing, there are nearly 30 million active samples in their archives.
- Maldev Academy - Malware development training and resources.
- TheZoo - A repository of live Malware samples. Both sources and binaries are available in this archive.
- VirusSign - Giant database of malware with different levels of access available. Currently has a 300TB library of roughly 700 million malware samples.