A collection of real-world malware samples, analysis exercises, and training resources for cybersecurity education and research.
Malware-samples is a GitHub repository that provides a curated collection of real-world malicious files, analysis exercises, and training resources for cybersecurity education. It offers password-protected malware samples from numerous families like Emotet, TrickBot, and AgentTesla, along with detailed walkthroughs and network captures to help professionals develop practical malware analysis skills in a safe environment.
Cybersecurity professionals, malware analysts, threat hunters, incident responders, security researchers, and students who need hands-on experience with real malware samples for training, research, or skill development.
This repository provides immediate access to a vast, organized collection of real malware samples and educational materials that are typically difficult to obtain legally. The accompanying analysis exercises and workshop materials offer structured learning paths, making it a comprehensive resource for both beginners and experienced analysts.
Malware samples, analysis exercises and other interesting resources.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Includes password-protected executables, documents, and scripts from numerous malware families like Emotet and TrickBot, organized by date and campaign for trend analysis, as seen in the detailed summary of samples.
Provides step-by-step walkthroughs on topics like shellcode execution and macro deobfuscation, with detailed solutions to reinforce practical skills, as listed in the malware analysis exercises section.
Offers training PCAPs for network analysis and workshop materials from conferences like DefCon, enhancing threat hunting and detection development, as highlighted in the training PCAPs and workshops sections.
All samples are in password-protected archives (password: infected) to prevent accidental execution, aligning with educational intent and clear disclaimers in the README.
As a personal GitHub repository, updates and new samples depend on the maintainer's availability, leading to potential gaps in current threat coverage, with the latest exercises dated 2022.
Assumes users have foundational knowledge of malware analysis tools and techniques, with limited guidance for absolute beginners, as exercises jump into advanced topics without basic tutorials.
Lacks official documentation, community forums, or guaranteed responses to issues, unlike commercial training platforms, relying solely on GitHub discussions for user help.