CYH5077 / Ransomware-GuardLinks
Anti-ransomware in linux, Decoy, Protect file, Protect drectory, Auto backup
☆25Updated 2 years ago
Alternatives and similar repositories for Ransomware-Guard
Users that are interested in Ransomware-Guard are comparing it to the libraries listed below
Sorting:
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Updated 7 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- DbgFlashVul☆12Updated 10 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- This project has been moved from a private repository☆26Updated 7 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 10 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago
- crash poc & Leak info PoC☆18Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 7 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- ☆13Updated 11 years ago
- ☆13Updated 8 years ago
- 虚拟机逃逸exp工具 VMware Escape Exploit before VMware WorkStation 12.5.5☆10Updated 8 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- ☆22Updated 8 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆23Updated 7 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- 使用SSDT HOOK 在windows上隐藏指定文件或者文件夹☆26Updated 4 years ago
- A minifilter driver for detecting and blocking ransomware virus☆27Updated 7 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 8 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆15Updated 10 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆20Updated 8 years ago
- Common Malware Techniques☆13Updated 2 years ago
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Updated 8 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 7 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago