This repo is a public collection of malware samples and related dissection/analysis information, maintained by InQuest. It gathers various kinds of malicious artifacts, executables, scripts, macros, obfuscated documents, etc., with metadata (e.g., VirusTotal reports), file carriers, and sample hashes. It’s intended for malware analysts/researchers to help study how malware works, how they are delivered, and how it evolves.

Features

  • Wide variety of sample types — includes executables, scripts, Office docs with macros, obfuscated payloads, etc.
  • Associated metadata / reports — many samples come with JSON / VirusTotal reports and sometimes decompiled sources or analysis.
  • Organized chronologically / by campaign — samples are grouped by date, malware family, and campaign name.
  • File-carrier examples — shows how malware is delivered (e.g. via Office docs, PowerShell, SWF, etc.).
  • Open source with permissive license — MIT license, which allows reuse / study.
  • Linkage to external resources — connects to blog posts, dissection writeups, interactive searchable interfaces (InQuest Labs DFI), etc.

Project Activity

See All Activity >

Categories

Security

License

MIT License

Follow malware-samples

malware-samples Web Site

Other Useful Business Software
Gen AI apps are built with MongoDB Atlas Icon
Gen AI apps are built with MongoDB Atlas

Build gen AI apps with an all-in-one modern database: MongoDB Atlas

MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
Start Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of malware-samples!