UIM-SEC / ransomware-samples
Warning! This repository contains samples of ransomware.
☆91Updated 2 years ago
Alternatives and similar repositories for ransomware-samples
Users that are interested in ransomware-samples are comparing it to the libraries listed below
Sorting:
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆118Updated 2 years ago
- Personal research and publication on malware families☆139Updated 4 months ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆176Updated 3 months ago
- Notes and IoCs of fresh malware☆58Updated 10 months ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆82Updated 7 years ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- Collection of resources that are made by the Malware Research community☆225Updated last year
- Malware sample library.☆574Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated 2 years ago
- Malware Sandboxes & Malware Source☆93Updated 8 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆84Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- Bringing you the best of the worst files on the Internet.☆329Updated 4 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Setup scripts for my Malware Analysis VMs☆252Updated 3 years ago
- MAL-CL (Malicious Command-Line)☆312Updated 2 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- Malware Analysis Techniques, published by Packt☆70Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- 0xpat blog☆100Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆578Updated last year
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆225Updated last year
- Simplified MITRE Use Cases, it describes the Attack and Detection☆45Updated 4 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆737Updated 3 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆115Updated 4 years ago
- c2 traffic☆188Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- Resources for learning malware analysis and reverse engineering☆107Updated last year