UIM-SEC / ransomware-samplesLinks
Warning! This repository contains samples of ransomware.
☆92Updated 2 years ago
Alternatives and similar repositories for ransomware-samples
Users that are interested in ransomware-samples are comparing it to the libraries listed below
Sorting:
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆83Updated 8 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆179Updated last week
- Personal research and publication on malware families☆139Updated 6 months ago
- Bringing you the best of the worst files on the Internet.☆335Updated 4 years ago
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆213Updated 3 years ago
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- Notes and IoCs of fresh malware☆58Updated last year
- Resources for learning malware analysis and reverse engineering☆106Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆120Updated 2 years ago
- 0xpat blog☆100Updated 3 years ago
- Exercise writeups from the book Practical Malware Analysis.☆226Updated last year
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆121Updated 4 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆85Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆57Updated last year
- Malware sample library.☆575Updated last year
- Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMal…☆269Updated last year
- Run several volatility plugins at the same time☆114Updated 2 years ago
- ☆122Updated last year
- Basic C2 Server☆191Updated 4 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- MAL-CL (Malicious Command-Line)☆314Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 4 years ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- Setup scripts for my Malware Analysis VMs☆254Updated 3 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆421Updated last year
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆90Updated 4 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆582Updated last year
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆141Updated 3 years ago