Cryakl / Ransomware-DatabaseLinks
For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
☆344Updated last week
Alternatives and similar repositories for Ransomware-Database
Users that are interested in Ransomware-Database are comparing it to the libraries listed below
Sorting:
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆389Updated 8 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆658Updated last month
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆435Updated 11 months ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆375Updated last week
- Embed a payload inside a PNG file☆321Updated 7 months ago
- ☆363Updated this week
- A repository of credential stealer formats☆217Updated 2 months ago
- Pure Malware Development Resource Collections☆297Updated 5 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆889Updated last week
- A collection of Cyber Threat Intelligence information gathered from the depths of the clearnet, deep web and dark web.☆125Updated this week
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆257Updated 2 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆166Updated 3 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆753Updated 2 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆114Updated 4 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆239Updated 8 months ago
- This is for Ethical Use only.☆389Updated last week
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆286Updated 2 years ago
- ⚠️ malware development☆550Updated last year
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆214Updated 3 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆364Updated last week
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆183Updated last month
- ☆147Updated last month
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆378Updated 2 weeks ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆210Updated this week
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 5 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆74Updated last month
- A list of useful tools for Malware Analysis (will be updated regularly)☆141Updated 9 months ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆224Updated last month
- AV/EDR Lab environment setup references to help in Malware development☆385Updated 3 months ago