🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
Pull the docker image (In Information), do not use this repository on your own computer or clone the repository and build the dockerfile on your down computer
To run the image use ie: ---docker run --name <name_of_given_container> -it ghcr.io/ronaldsonbellande/malware-exhibit:main bash---
or if it build your own image from the Dockerfile replace ie: --- docker run --name <name_of_given_container> -it <docker_image> bash ---
Few things to NOTE 📝👇
The malware in this repo is either:
1. FEW: Built by me 🤭
2. SOME: Analysed by me ⚡
3. A FEW: Acquired and retrieved during threat hunting and threat intelligence ☄️
4. MOST: Shared/Sourced from other malware researchers 😊 VX-UNDERGROUND, KASPERSKY, LIFKA, JOHN HAMMOND, CTFs...and a few others😊
👉 There are over a thousand malware samples in this repository from simple fireworks to weapons-of-mass-destruction. 👉 To reverse Engineer these samples, you can use Ghidra, Responder, IDApro. 👉 Ensure you have the necessary support environment installed i.e JDK, Python3, Ruby etc 👉 All source code which is packaged may or may not be set with the password 'infected' (without the '). Individual files are likely not packaged. 👉 To get even more malware check out VX-UNDERGROUND, MALWARETECH, ANY.RUN, VT, LIFKA...etc
To the maximum extent permitted by applicable law, I and/or affiliates whom this repo is sourced and or submitted content to this repo, shall not be liable for any indirect, incidental, special, consequential or punitive damages, or any loss of profits or revenue, whether incurred directly or indirectly, or any loss of data, use, goodwill, or other intangible losses, resulting from:
👉 (i) your access to this resource and/or inability to access this resource; 👉 (ii) any conduct or content of any third party referenced by this resource, including, any offensive or illegal conduct or other users or third parties; 👉 (iii) any content obtained from this resource or any of its resources