Flooding-against-Ransomware / ranfloodLinks
The Ranflood ransomware contrast tool
☆17Updated last year
Alternatives and similar repositories for ranflood
Users that are interested in ranflood are comparing it to the libraries listed below
Sorting:
- Curated list of ransomware-related resources; awesome style.☆21Updated 11 months ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆92Updated 4 years ago
- A C ransomware(educational only)☆21Updated 3 years ago
- Ransomware for demonstration☆18Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Updated 4 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆135Updated 4 years ago
- ☆27Updated 4 years ago
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆22Updated 7 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- A ransomware written in python for Windows☆13Updated 3 years ago
- Open-Source Ransomware As A Service for Linux, MacOS and Windows☆14Updated 5 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated 2 years ago
- ☆125Updated last year
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.☆27Updated 3 years ago
- Well, I have created this shit for educational pruposes (I think)☆38Updated 3 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- Warning! This repository contains samples of ransomware.☆94Updated 2 years ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Updated last month
- Reversed source code of the Babuk Ransomware Version 1☆20Updated 4 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆56Updated 2 years ago
- ☆53Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated 2 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆104Updated 3 years ago
- Cybercrime forums for Cyber Threat Intelligence purpose☆91Updated 6 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆118Updated last year
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆90Updated 8 years ago
- Repository of open source malware here on Github!☆44Updated 3 years ago