UIM-SEC / ransomware-samples
Warning! This repository contains samples of ransomware.
☆91Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ransomware-samples
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆111Updated 2 years ago
- Personal research and publication on malware families☆137Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆165Updated 2 months ago
- Bringing you the best of the worst files on the Internet.☆299Updated 3 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆81Updated 7 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆111Updated last year
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆98Updated 3 years ago
- Exercise writeups from the book Practical Malware Analysis.☆198Updated last year
- Collection of resources that are made by the Malware Research community☆220Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆573Updated 6 months ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆885Updated 7 months ago
- Malware sample library.☆558Updated last year
- 0xpat blog☆97Updated 3 years ago
- Notes and IoCs of fresh malware☆59Updated 4 months ago
- Small collection of Ransomware organized by family.☆184Updated last month
- Setup scripts for my Malware Analysis VMs☆245Updated 2 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆80Updated last year
- The Windows Malware Analysis Reversing Core Tools☆89Updated 3 years ago
- A collection of malware samples.☆34Updated 6 years ago
- Just another collection of links, tools, reports and other stuff☆20Updated 3 years ago
- Malware Analysis Tools☆29Updated 5 years ago
- Malware Analysis Techniques, published by Packt☆64Updated last year
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- Malware Sandboxes & Malware Source☆83Updated 7 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year
- Resources for learning malware analysis and reverse engineering☆104Updated 9 months ago
- MBC content in markdown☆375Updated this week
- ☆130Updated 9 months ago