Malware Samples and Reversing Tools

All content is encrypted for your safety and to avoid being censored on GitHub, to import the GPG key 66ED4A9A4D70D36FE48196419AD730FE9CDE5661.

curl -sq https://github.com/opsxcq.gpg | gpg --import

And then decrypt it:

gpg --decrypt Win32Disassembler.exe.gpg > output

If the key is not trusted, the message bellow is shown but this doesn’t interfere with the normal workflow. But consider trusting the key to avoid these warnings.

gpg: Signature made Sat 15 Jan 2022 09:47:42 AM EST
gpg:                using RSA key 66ED4A9A4D70D36FE48196419AD730FE9CDE5661
gpg: Good signature from "OPSXCQ <opsxcq@strm.sh>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 66ED 4A9A 4D70 D36F E481  9641 9AD7 30FE 9CDE 5661

Tools

Some old school reverse engineering tools are made available for your nostalgia:

Malware Samples

Bellow a small malware sample list, feel free to start a discussion or contribute with more samples. Check the FORUM link on the menu for more details.

Forums and online resources

## STRM ##

A pro-freedom hacktivist thinktank.