Security & Pentesting
โ
593
C++
mstfknn/malware-sample-library
593
Stars
174
Forks
0
Issues
C++
Language
A curated malware sample library containing specimens from major threat actors and campaigns including APT28, APT29, APT34, APT37, APTC23, and Babuk ransomware. Designed for malware analysts, reverse engineers, and security researchers who need real-world samples for analysis, signature development, and threat intelligence research. The collection provides a structured repository of malware binaries for educational and defensive security purposes.
View on GitHub
git clone https://github.com/mstfknn/malware-sample-library.git
Quick Start Example
markdown
# Malware Sample Library
## Threat Actors Covered
- APT28 (Fancy Bear)
- APT29 (Cozy Bear)
- APT34 (OilRig)
- APT37 (Reaper)
- APTC23 (Arid Viper)
- Babuk Ransomware
## Usage
# WARNING: Handle samples in isolated environments only
# Use dedicated malware analysis VMs