Cryakl / Ransomware-Database
For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
☆332Updated last week
Alternatives and similar repositories for Ransomware-Database
Users that are interested in Ransomware-Database are comparing it to the libraries listed below
Sorting:
- A repository of credential stealer formats☆214Updated last month
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆381Updated 7 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆649Updated 2 weeks ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆344Updated 2 months ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆767Updated this week
- Embed a payload inside a PNG file☆315Updated 6 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆749Updated last month
- A list of useful tools for Malware Analysis (will be updated regularly)☆141Updated 8 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆161Updated 2 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆373Updated 5 months ago
- This is for Ethical Use only.☆363Updated 2 weeks ago
- WMI virus, because funny☆282Updated 3 months ago
- Phishing with a fake reCAPTCHA☆548Updated 8 months ago
- AV/EDR Lab environment setup references to help in Malware development☆379Updated 2 months ago
- Pure Malware Development Resource Collections☆281Updated 4 months ago
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆253Updated last month
- C2 infrastructure over Microsoft Teams.☆675Updated 3 months ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆390Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆237Updated 7 months ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆428Updated 10 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆112Updated 3 months ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆207Updated this week
- A collection of Cyber Threat Intelligence information gathered from the depths of the clearnet, deep web and dark web.☆110Updated last week
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆201Updated 2 months ago
- ☆362Updated this week
- The LockBit builder files☆115Updated last year
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆177Updated 2 months ago
- Wordlist to crack .zip-file password☆202Updated 2 years ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆154Updated 6 months ago