SinaKarvandi / Redemption-Anti-Ransomware
A new idea to build an anti ransomware
☆23Updated 4 years ago
Alternatives and similar repositories for Redemption-Anti-Ransomware
Users that are interested in Redemption-Anti-Ransomware are comparing it to the libraries listed below
Sorting:
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 9 years ago
- Archive of ransomware decryptors☆30Updated 7 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆43Updated 7 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- Reversed source code to the Babuk ransomware builder.☆17Updated 3 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆25Updated 3 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- Malware Development☆11Updated 4 years ago
- ☆22Updated 4 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 8 months ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- Decompiled NotPetya File Encryptor Code☆14Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆26Updated 3 years ago
- Conti Ransomware Source Code☆20Updated 3 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Protects deletion of files with a specified extension using a kernel-mode driver.☆75Updated 6 years ago
- Educational ransomware for evaluating ransomware detection tools☆8Updated last year
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 7 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- IDAPython scripts☆15Updated 7 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆11Updated 5 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆28Updated 3 years ago