Flooding-against-Ransomware / ranflood
The Ranflood ransomware contrast tool
☆18Updated 4 months ago
Alternatives and similar repositories for ranflood
Users that are interested in ranflood are comparing it to the libraries listed below
Sorting:
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆89Updated 4 years ago
- Ransomware for demonstration☆15Updated 2 years ago
- Educational ransomware for evaluating ransomware detection tools☆8Updated last year
- ☆26Updated 4 years ago
- The Ransomware.live API Server is a Flask-based web application that provides endpoints to query and retrieve data related to ransomware …☆23Updated 6 months ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆15Updated last year
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆19Updated 3 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆34Updated 3 years ago
- Curated list of ransomware-related resources; awesome style.☆18Updated 4 months ago
- A C ransomware(educational only)☆18Updated 3 years ago
- ☆14Updated 7 years ago
- ☆48Updated last week
- IOCs from zLabs research☆18Updated 3 weeks ago
- This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and c…☆8Updated 2 years ago
- ☆19Updated 3 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆47Updated 2 years ago
- Darkside Ransomware☆12Updated 4 years ago
- IOCs collected during day-to-day activities☆54Updated last week
- Ransomware groups posts☆39Updated this week
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 4 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Some of my Malware Analysis writeups.☆45Updated last year
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated last year
- Collaborative malware exchange repository.☆33Updated 5 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated 7 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Hashes of infamous malware☆26Updated last year