Crypto ransomware detection & prevention
☆19Jul 26, 2016Updated 9 years ago
Alternatives and similar repositories for ransomcare
Users that are interested in ransomcare are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Ransomware recovery app for Nextcloud☆25Jan 4, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 11 months ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Jan 23, 2017Updated 9 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Application for STIX v2.0 objects management and analysis☆27Nov 9, 2017Updated 8 years ago
- Starter project for the Bitcoin challenge https://www.appbrewery.co/p/how-to-make-app-ios☆11Nov 16, 2017Updated 8 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73May 22, 2023Updated 2 years ago
- Mach-O file format reader, written entirely in Swift☆13May 10, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- DumpStrings programmatically extracts strings from Mach-O (macOS), ELF (Linux), and PE (Windows) binary formats by parsing their string-c…☆17Mar 14, 2026Updated 2 weeks ago
- chrome插件小工具,可以获取本机公网、内网IP、生成当前网页二维码、生成身份证号、指定URL生成二维码、模拟GET/POST请求、查询银行卡卡 种及开户行☆17Nov 1, 2019Updated 6 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41May 3, 2021Updated 4 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Mar 6, 2017Updated 9 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆18Feb 17, 2015Updated 11 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Nov 19, 2024Updated last year
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 8 years ago
- send dns query packet☆26Feb 24, 2021Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 10 years ago
- A phishing attack for Macs that copies the victim's password and keychain to the Public folder.☆45Dec 18, 2016Updated 9 years ago
- Bitcoin private key cracker use brute force. Everyone can use it. Best wishes!☆25Nov 16, 2017Updated 8 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- eda-3 from many years ago☆14Sep 5, 2014Updated 11 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆70Mar 15, 2015Updated 11 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 10 years ago
- A Forensic Framework for Skype☆65May 21, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- ☆12Jun 7, 2018Updated 7 years ago
- Konrads' Pen-Ultimate (Windows) Log File Parser☆14Dec 27, 2025Updated 3 months ago
- Training materials I've written.☆11Nov 11, 2025Updated 4 months ago
- Periodically scan target ranges using nmap, ndiff and emailing changes☆11Jan 13, 2017Updated 9 years ago