{"id":29724658,"url":"https://github.com/cybersecurity-dev/polymorphic-malware-cookbook","last_synced_at":"2026-02-11T18:31:23.145Z","repository":{"id":294674887,"uuid":"987704929","full_name":"cybersecurity-dev/Polymorphic-Malware-Cookbook","owner":"cybersecurity-dev","description":"Polymorphic Malware Cookbook","archived":false,"fork":false,"pushed_at":"2025-11-13T19:46:26.000Z","size":1736,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-11-13T21:21:42.488Z","etag":null,"topics":["malware","malware-development","polymorphic","polymorphic-malware","polymorphism"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/cybersecurity-dev.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2025-05-21T13:15:06.000Z","updated_at":"2025-11-13T19:46:29.000Z","dependencies_parsed_at":null,"dependency_job_id":"8c3e009c-7d69-4acf-8ae6-8d4c1488176d","html_url":"https://github.com/cybersecurity-dev/Polymorphic-Malware-Cookbook","commit_stats":null,"previous_names":["cybersecurity-dev/polymorphic-malware-cookbook"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/cybersecurity-dev/Polymorphic-Malware-Cookbook","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FPolymorphic-Malware-Cookbook","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FPolymorphic-Malware-Cookbook/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FPolymorphic-Malware-Cookbook/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FPolymorphic-Malware-Cookbook/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/cybersecurity-dev","download_url":"https://codeload.github.com/cybersecurity-dev/Polymorphic-Malware-Cookbook/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FPolymorphic-Malware-Cookbook/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":29341216,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-02-11T18:24:36.877Z","status":"ssl_error","status_checked_at":"2026-02-11T18:23:50.867Z","response_time":97,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["malware","malware-development","polymorphic","polymorphic-malware","polymorphism"],"created_at":"2025-07-24T21:25:42.664Z","updated_at":"2026-02-11T18:31:23.140Z","avatar_url":"https://github.com/cybersecurity-dev.png","language":null,"readme":"\u003cdiv align=\"center\"\u003e\n    \u003cp align=\"center\"\u003e\n        \u003ca href=\"https://cyberthreatdefence.com\"\u003e\n          \u003cimg width=\"50%\" height=\"auto\" src=\"./.assets/polymorphic.png\" height=\"175px\" /\u003e\n        \u003c/a\u003e\n    \u003c/p\u003e\n\n# [Polymorphic](https://www.crowdstrike.com/en-us/cybersecurity-101/malware/polymorphic-virus/) [Malware](https://github.com/cybersecurity-dev/awesome-polymorphic-malware-analysis-scientific-research) [Cookbook](https://github.com/cybersecurity-dev/awesome-polymorphic-malware)\n\u003c/div\u003e\n\n[![Linux](https://img.shields.io/badge/Linux-FCC624?style=for-the-badge\u0026logo=linux\u0026logoColor=black)]()\n[![Windows](https://custom-icon-badges.demolab.com/badge/Windows-0078D6?style=for-the-badge\u0026logo=windows11\u0026logoColor=white)]()\n[![YouTube](https://img.shields.io/badge/YouTube-%23FF0000.svg?style=for-the-badge\u0026logo=YouTube\u0026logoColor=white)]()\n[![Reddit](https://img.shields.io/badge/Reddit-FF4500?style=for-the-badge\u0026logo=reddit\u0026logoColor=white)]()\n\n\u003cp align=\"center\"\u003e\n    \u003ca href=\"https://github.com/cybersecurity-dev/\"\u003e\u003cimg height=\"25\" src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/github.svg\" alt=\"GitHub\"\u003e\u003c/a\u003e\n    \u0026nbsp;\n    \u003ca href=\"https://www.youtube.com/@CyberThreatDefence\"\u003e\u003cimg height=\"25\" src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/youtube.svg\" alt=\"YouTube\"\u003e\u003c/a\u003e\n    \u0026nbsp;\n    \u003ca href=\"https://cyberthreatdefence.com/my_awesome_lists\"\u003e\u003cimg height=\"20\" src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/blog.svg\" alt=\"My Awesome Lists\"\u003e\u003c/a\u003e\n    \u003cimg src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/bar.gif\"\u003e\n\u003c/p\u003e\n\n* **A theoretical collection of techniques and methods for creating or evolving polymorphic malware.** Manual or a set of guidelines used by malware developers to build new, more evasive strains of malware.\n* **A resource that explains the various polymorphic techniques.** How malware authors achieve code mutation, encryption, and other evasion tactics.\n* **A fictional or informal term** used to describe the sophisticated methods employed by threat actors to make their malware \"shape-shift\" and bypass security measures.\n\n\n\n##\n\n### My Awesome Lists\nYou can access the my awesome lists [here](https://cyberthreatdefence.com/my_awesome_lists)\n\n### Contributing\n\n[Contributions of any kind welcome, just follow the guidelines](contributing.md)!\n\n### Contributors\n\n[Thanks goes to these contributors](https://github.com/cybersecurity-dev/Polymorphic-Malware-Cookbook/graphs/contributors)!\n\n[🔼 Back to top](#polymorphic-malware-cookbook)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurity-dev%2Fpolymorphic-malware-cookbook","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcybersecurity-dev%2Fpolymorphic-malware-cookbook","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurity-dev%2Fpolymorphic-malware-cookbook/lists"}