Caution
Caution, this program downloads real malware samples. Always use this in a secure and isolated environment.
This service makes it possible to query malware samples (e.g. by hash) and extract their opcode sequences. The underlying information comes from the MalwareBazaar API database, which provides regularly updated threat intelligence data.
The aim of the project is to facilitate the analysis of malware by providing opcode representations - especially for machine learning models, reverse engineering or security research.
Install Docker and run it with the following command:
docker run -p 8000:8000 -v ABUSE_CH_API_KEY="<YOUR_BAZAAR_ABUSE_KEY>" opcode_genrator- Classification of malware based on their opcode sequences
- Comparison of malware families
- Detection of code reuse in malware
- Research & development in the field of malware detection with ML