-
Actually, we had planned a module to collect malware automatically. But we should not reinvent the wheel.
The following open source project has implemented some python scripts to download malware:
ht…
-
Some malware samples use document properties to hide part of their payload.
Example: https://www.joesecurity.org/reports/report-952a36f4231c8628acea028b4145daec.html
-
I would request to add this
https://github.com/brevent/genuine.
As this is anti Xposed hook, anti fake signature, anti virtual app (binder proxy), and optional anti odex, anti overlay this may …
-
hi, thanlau:
I have gone through your work on the PdfRep dataset, and I really appreciate the effort and dedication you put into creating it.
But now I am unable to download the CIC-Evasive-PDFMal2…
-
A common malware obfuscation technique is to play with the return address value on the stack and alter the control flow. Here is an example of it:
```
sub_4179d6:
004179d6 push eax {var_4}
0…
-
Hello,
I'm using ph0neutria for a long time now. Thaaanks so much for the work you're doing with it.
How would it sound to add https://bazaar.abuse.ch/api/#download as another source of malware sa…
-
There's a malware sharing platform called "MISP" (or https://github.com/MISP), which might provide a more useful structure for sharing these samples than GitHub.
Found through https://twitter.com/d…
-
Hello! In the README states that no benign samples are included in the dataset. While exploring the meta.db in s3://sorel-20m/09-DEC-2020/processed-data/meta.db, I noticed that the db contains a field…
-
Hi,
As we know that malware tactics and techniques are keep growing, so we need to be ready to fight against that, I saw many samples where cuckoo fails to analysis the setup, because that samples …
-