Muteces (mutexes/mutants) used by various malware families
☆23Nov 11, 2024Updated last year
Alternatives and similar repositories for malware-mutex
Users that are interested in malware-mutex are comparing it to the libraries listed below
Sorting:
- A simple AES malware crypter☆16Mar 16, 2018Updated 7 years ago
- Extract Silently WiFi Passwords By Mail & USB☆19Dec 4, 2021Updated 4 years ago
- FUD Linux Ransomware☆14Jan 12, 2023Updated 3 years ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Feb 18, 2026Updated 2 weeks ago
- Resources from Trend Micro Research teams☆26Nov 14, 2024Updated last year
- Vaccine for STOP/DJVU ransomware, prevents encryption☆26Oct 30, 2025Updated 4 months ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- ☆12Oct 10, 2023Updated 2 years ago
- ☆35Jan 13, 2026Updated last month
- Security Content for the PEAK Threat Hunting Framework☆44Feb 15, 2024Updated 2 years ago
- This utility smart contact can be used to build DAPP which can lock LP Tokens or any BEP20 or ERC20 Tokens (Depends on deployment chain) …☆11Sep 30, 2021Updated 4 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- Ransomware simulator written in C#☆38Jun 28, 2022Updated 3 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆38Sep 4, 2023Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- ☆13Sep 28, 2024Updated last year
- A proof-of-stake based crypto currency☆13Mar 6, 2024Updated 2 years ago
- A project managing Electronic Health Records(EHR) of patients and giving permissions to audity using Solidity(Etherium Blockchain) with T…☆11Aug 7, 2021Updated 4 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆11Mar 2, 2019Updated 7 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- ☆12Jun 1, 2024Updated last year
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Solutions to Problems from the Hackerrank Math 🧮 Domain.☆13Aug 4, 2022Updated 3 years ago
- Some tools i made for personal use☆10Mar 15, 2024Updated last year
- Just your regular Qur'an apps on Android platform, except I'm trying to make it's app size as small as possible while not sacrificing any…☆15Nov 13, 2025Updated 3 months ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆42Feb 18, 2023Updated 3 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Dec 15, 2023Updated 2 years ago
- Public open-source code of malware Shamoon (aka Disttrack).☆36May 28, 2015Updated 10 years ago
- ☆37Mar 3, 2025Updated last year
- A Linux Cyptomining malware☆38May 5, 2023Updated 2 years ago
- The tiniest standalone script to make a window on MacOS☆12Jan 21, 2023Updated 3 years ago
- ☆10Mar 31, 2021Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Intune goodies☆10Dec 20, 2019Updated 6 years ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆10May 12, 2022Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago