UIM-SEC / ransomware-samplesLinks
Warning! This repository contains samples of ransomware.
☆93Updated 2 years ago
Alternatives and similar repositories for ransomware-samples
Users that are interested in ransomware-samples are comparing it to the libraries listed below
Sorting:
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 3 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆90Updated 8 years ago
- Bringing you the best of the worst files on the Internet.☆340Updated 4 years ago
- Personal research and publication on malware families☆141Updated 10 months ago
- Basic C2 Server☆193Updated 4 years ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆90Updated 4 years ago
- Malware sample library.☆583Updated last year
- Notes and IoCs of fresh malware☆59Updated last year
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆225Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆131Updated 4 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆433Updated last year
- MAL-CL (Malicious Command-Line)☆319Updated 2 years ago
- ☆123Updated last year
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆182Updated 3 weeks ago
- A curated list of malware repositories, trackers and malware analysis tools☆88Updated 2 years ago
- Setup scripts for my Malware Analysis VMs☆256Updated 3 years ago
- Exercise writeups from the book Practical Malware Analysis.☆236Updated 2 years ago
- ☆86Updated 3 weeks ago
- Run several volatility plugins at the same time☆115Updated 3 years ago
- ☆150Updated 11 years ago
- Collection of resources that are made by the Malware Research community☆234Updated 2 years ago
- Collection of various files from infected hosts☆75Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- The Windows Malware Analysis Reversing Core Tools☆96Updated 4 years ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆183Updated 4 years ago
- Malware Sandboxes & Malware Source☆101Updated 8 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Updated 3 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆243Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago