UIM-SEC / ransomware-samplesLinks
Warning! This repository contains samples of ransomware.
☆92Updated 2 years ago
Alternatives and similar repositories for ransomware-samples
Users that are interested in ransomware-samples are comparing it to the libraries listed below
Sorting:
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 2 years ago
- Bringing you the best of the worst files on the Internet.☆333Updated 4 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆85Updated 8 years ago
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆213Updated 3 years ago
- Personal research and publication on malware families☆140Updated 7 months ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆124Updated 4 years ago
- 0xpat blog☆100Updated 3 years ago
- Malware sample library.☆575Updated last year
- Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMal…☆270Updated last year
- Research tools for analysing Cerberus banking trojan.☆127Updated 3 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆181Updated last month
- Collection of resources that are made by the Malware Research community☆229Updated 2 years ago
- ☆123Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆120Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆226Updated 2 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- A curated list of malware repositories, trackers and malware analysis tools☆86Updated 2 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- Basic C2 Server☆190Updated 4 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆583Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 4 years ago
- Setup scripts for my Malware Analysis VMs☆254Updated 3 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- MAL-CL (Malicious Command-Line)☆315Updated 2 years ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆87Updated 4 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆425Updated last year
- Malware Analysis Techniques, published by Packt☆73Updated 2 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- The Windows Malware Analysis Reversing Core Tools☆96Updated 4 years ago