- Networking Free Blocklists of Suspected Malicious IPs and URLs
A curated list of free blocklists containing IP addresses and URLs of systems suspected of malicious activity. Sources include DShield, PhishTank, and others—each with different formats, goals,...
- Malware Analysis Free Malware Sample Sources for Researchers
A curated list of free sources where malware researchers can obtain samples for analysis, including MalwareBazaar, Hybrid Analysis, VirusShare, and vx-underground. Most require registration, and...
- Malware Analysis Version 3 Release of the REMnux Linux Distro for Malware Analysis
- Tools Extracting Malicious Flash Objects from PDFs Using SWF Mastah
SWF Mastah by Brandon Dixon extracts malicious Flash objects from PDFs in one step, using the PDF X-RAY framework and Peepdf. It can handle complex PDF files even when pdf-parser fails to locate or...
- Malware Analysis Preparing The Next Release of REMnux Distro
- Malware Analysis How Security Companies Assign Names to Malware Specimens
Security companies base malware naming on the CARO scheme, which groups specimens into families by code similarity in a Type/Platform/Family.Variant format. MITRE's Common Malware Enumeration...