UIM-SEC / ransomware-samplesLinks
Warning! This repository contains samples of ransomware.
☆94Updated 3 years ago
Alternatives and similar repositories for ransomware-samples
Users that are interested in ransomware-samples are comparing it to the libraries listed below
Sorting:
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆121Updated 3 years ago
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆230Updated 3 years ago
- Bringing you the best of the worst files on the Internet.☆347Updated 4 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆90Updated 8 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆141Updated 4 years ago
- Personal research and publication on malware families☆142Updated last year
- Notes and IoCs of fresh malware☆61Updated last year
- Collection of resources that are made by the Malware Research community☆236Updated 2 years ago
- Basic C2 Server☆193Updated 4 years ago
- 0xpat blog☆109Updated 4 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆94Updated 3 years ago
- Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMal…☆270Updated last year
- Run several volatility plugins at the same time☆117Updated 3 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆184Updated 4 months ago
- ☆125Updated last year
- Malware sample library.☆592Updated 2 years ago
- Setup scripts for my Malware Analysis VMs☆261Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Small collection of Ransomware organized by family.☆270Updated last year
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆95Updated 4 years ago
- Exercise writeups from the book Practical Malware Analysis.☆245Updated 2 years ago
- ☆90Updated 2 months ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆143Updated 4 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆441Updated last year
- MAL-CL (Malicious Command-Line)☆322Updated 3 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 5 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Malware Analysis Techniques, published by Packt☆78Updated 3 years ago
- Malware Analysis Tools☆31Updated 6 years ago