Warning! This repository contains samples of ransomware.
☆95Jan 3, 2023Updated 3 years ago
Alternatives and similar repositories for ransomware-samples
Users that are interested in ransomware-samples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Small collection of Ransomware organized by family.☆278Oct 6, 2024Updated last year
- Pull some collected APT group related samples, ransomware, remote control and other malicious programs for security researchers to use.☆44Dec 10, 2019Updated 6 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware e…☆11Aug 14, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Password:ВсеБудеУкраїна☆16Mar 21, 2022Updated 4 years ago
- ☆17Aug 26, 2024Updated last year
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Retro programming in Borland Turbo Assembler☆15Dec 19, 2018Updated 7 years ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆41Oct 24, 2025Updated 5 months ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- Bypass 2FA Instagram☆51Jan 19, 2020Updated 6 years ago
- Scripts, tools and drivers for wardriving under Mac OSX☆14Dec 7, 2016Updated 9 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23May 24, 2020Updated 5 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- ☆16Mar 6, 2019Updated 7 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆145Mar 1, 2021Updated 5 years ago
- ☆50Apr 1, 2020Updated 6 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 5 years ago
- ☆17Oct 19, 2016Updated 9 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- Override factory brightness settings with ROOT Access [Android]☆14May 15, 2023Updated 2 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- A command-line tool written in Python 3 to download files from VirusTotal☆16Sep 25, 2019Updated 6 years ago
- A collection of four algotihms implemented in C++ and compared to find the longest common subsequence in strings with binary digits and o…☆12Jan 1, 2021Updated 5 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Automatically exported from code.google.com/p/bypass-x64-dse☆21Oct 1, 2015Updated 10 years ago