MalwareSamples / Ransomware-Malware-SamplesLinks
☆27Updated 4 years ago
Alternatives and similar repositories for Ransomware-Malware-Samples
Users that are interested in Ransomware-Malware-Samples are comparing it to the libraries listed below
Sorting:
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Updated 2 years ago
- Collaborative malware exchange repository.☆33Updated 11 months ago
- Notes and IoCs of fresh malware☆59Updated last year
- ☆35Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Updated 4 years ago
- Well, I have created this shit for educational pruposes (I think)☆38Updated 3 years ago
- My favorite resources and tools for malware analysis.☆41Updated 5 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Updated 4 years ago
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆47Updated 4 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆90Updated 8 years ago
- Reversed source code to the Babuk ransomware builder.☆18Updated 4 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20Updated 4 years ago
- Curated list of ransomware-related resources; awesome style.☆21Updated 10 months ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆11Updated 2 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Updated 8 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Malware captured with honeypots☆38Updated 8 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆91Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- iOS malware samples☆43Updated 9 years ago
- ☆53Updated 4 years ago
- Conti Ransomware Source Code☆20Updated 3 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- Sources Codes of many Office Malwares