MalwareSamples / Ransomware-Malware-SamplesLinks
☆27Updated 4 years ago
Alternatives and similar repositories for Ransomware-Malware-Samples
Users that are interested in Ransomware-Malware-Samples are comparing it to the libraries listed below
Sorting:
- ☆35Updated 4 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Updated 2 years ago
- Collaborative malware exchange repository.☆33Updated 11 months ago
- Reversed source code of the Babuk Ransomware Version 1☆20Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.☆27Updated 2 years ago
- Curated list of ransomware-related resources; awesome style.☆20Updated 9 months ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆11Updated 2 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- My favorite resources and tools for malware analysis.☆40Updated 5 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 4 years ago
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆47Updated 4 years ago
- ☆53Updated 4 years ago
- Malware captured with honeypots☆38Updated 8 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- Just another collection of links, tools, reports and other stuff☆24Updated 4 years ago
- Curated list of enterprise ransomware defense resources☆14Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- A Collection of Android Malware☆17Updated 6 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Updated 2 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Updated 8 years ago
- Bare Bones Banking malware coded for research & educational purposes☆89Updated 5 years ago
- ☆25Updated 3 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆14Updated 7 months ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- iOS malware samples☆44Updated 9 years ago