Flooding-against-Ransomware / ranfloodLinks
The Ranflood ransomware contrast tool
☆17Updated last year
Alternatives and similar repositories for ranflood
Users that are interested in ranflood are comparing it to the libraries listed below
Sorting:
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆94Updated 4 years ago
- Curated list of ransomware-related resources; awesome style.☆28Updated last year
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Updated 5 years ago
- ☆14Updated 7 years ago
- ☆28Updated 4 years ago
- A ransomware written in python for Windows☆13Updated 3 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆58Updated 2 years ago
- Ransomware for demonstration☆18Updated 2 years ago
- Machine Learning Ransomware Detection☆35Updated 7 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆141Updated 4 years ago
- A C ransomware(educational only)☆22Updated 3 years ago
- Small collection of Ransomware organized by family.☆270Updated last year
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Updated 2 years ago
- ☆124Updated last year
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆102Updated 3 years ago
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆22Updated 7 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Warning! This repository contains samples of ransomware.☆94Updated 3 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Cybercrime forums for Cyber Threat Intelligence purpose☆91Updated 6 years ago
- A Collection of Android Malware☆18Updated 6 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- ☆10Updated 5 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆94Updated 2 years ago
- ADDS (Active Directory Domain Services)☆28Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 3 years ago
- A USB phishing evaluation platform☆46Updated 10 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Updated 3 years ago