UIM-SEC / ransomware-samplesLinks
Warning! This repository contains samples of ransomware.
☆93Updated 2 years ago
Alternatives and similar repositories for ransomware-samples
Users that are interested in ransomware-samples are comparing it to the libraries listed below
Sorting:
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆90Updated 8 years ago
- Personal research and publication on malware families☆142Updated 11 months ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆120Updated 3 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆135Updated 4 years ago
- Bringing you the best of the worst files on the Internet.☆342Updated 4 years ago
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆227Updated 3 years ago
- ☆125Updated last year
- Basic C2 Server☆193Updated 4 years ago
- Collection of resources that are made by the Malware Research community☆234Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 5 years ago
- Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMal…☆272Updated last year
- Notes and IoCs of fresh malware☆59Updated last year
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆183Updated 2 months ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆92Updated 4 years ago
- 0xpat blog☆108Updated 4 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆91Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆140Updated last year
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Run several volatility plugins at the same time☆115Updated 3 years ago
- Malware sample library.☆585Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆124Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆240Updated 2 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆435Updated last year
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 4 years ago
- Just some lists of Malware Configs☆173Updated 11 months ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Updated 3 years ago
- Setup scripts for my Malware Analysis VMs☆257Updated 3 years ago
- MAL-CL (Malicious Command-Line)☆320Updated 2 years ago
- Malware Analysis Tools☆31Updated 6 years ago