Flooding-against-Ransomware / ranfloodLinks
The Ranflood ransomware contrast tool
☆17Updated last year
Alternatives and similar repositories for ranflood
Users that are interested in ranflood are comparing it to the libraries listed below
Sorting:
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆95Updated 4 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆141Updated 4 years ago
- Curated list of ransomware-related resources; awesome style.☆29Updated last year
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Updated 3 years ago
- Ransomware for demonstration☆19Updated 2 years ago
- ☆28Updated 5 years ago
- ☆125Updated last year
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 4 years ago
- Small collection of Ransomware organized by family.☆270Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- Storage for the IOCs I collect☆11Updated 10 months ago
- A ransomware written in python for Windows☆13Updated 3 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆58Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆94Updated 3 years ago
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆22Updated 7 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Warning! This repository contains samples of ransomware.☆94Updated 3 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆90Updated 8 years ago
- ☆14Updated 7 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- Curated list of enterprise ransomware defense resources☆14Updated 3 years ago
- Open-Source Ransomware As A Service for Linux, MacOS and Windows☆14Updated 5 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆11Updated 5 years ago
- Nexus of Android banking Trojans☆15Updated 2 years ago
- A USB phishing evaluation platform☆46Updated 10 years ago
- Notes and IoCs of fresh malware☆61Updated last year
- A Collection of Android Malware☆18Updated 6 years ago
- Just another collection of links, tools, reports and other stuff☆24Updated 4 years ago