albertzsigovits / malware-mutexView external linksLinks
Muteces (mutexes/mutants) used by various malware families
☆22Nov 11, 2024Updated last year
Alternatives and similar repositories for malware-mutex
Users that are interested in malware-mutex are comparing it to the libraries listed below
Sorting:
- Collection of generic YARA rules☆16Aug 17, 2025Updated 5 months ago
- A simple AES malware crypter☆16Mar 16, 2018Updated 7 years ago
- Extract Silently WiFi Passwords By Mail & USB☆19Dec 4, 2021Updated 4 years ago
- FUD Linux Ransomware☆14Jan 12, 2023Updated 3 years ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Feb 4, 2026Updated last week
- Resources from Trend Micro Research teams☆26Nov 14, 2024Updated last year
- Vaccine for STOP/DJVU ransomware, prevents encryption☆26Oct 30, 2025Updated 3 months ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- ☆12Oct 10, 2023Updated 2 years ago
- ☆35Jan 13, 2026Updated last month
- Security Content for the PEAK Threat Hunting Framework☆40Feb 15, 2024Updated last year
- This utility smart contact can be used to build DAPP which can lock LP Tokens or any BEP20 or ERC20 Tokens (Depends on deployment chain) …☆11Sep 30, 2021Updated 4 years ago
- Rules shared by the community from 100 Days of YARA 2024☆89Jan 1, 2025Updated last year
- Encrypting and decrypting files with AES or RC4 on Microsoft Windows☆37Apr 6, 2014Updated 11 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- Most Starred Repo On Github --future☆19Jan 27, 2019Updated 7 years ago
- Ransomware simulator written in C#☆37Jun 28, 2022Updated 3 years ago
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year
- ☆12Nov 13, 2023Updated 2 years ago
- A proof-of-stake based crypto currency☆13Mar 6, 2024Updated last year
- Quick analysis focusing on most important of a Malware or a Threat☆41Sep 4, 2023Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- Forensic Artifact Collection Tool Matrix☆94Nov 9, 2024Updated last year
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Just your regular Qur'an apps on Android platform, except I'm trying to make it's app size as small as possible while not sacrificing any…☆15Nov 13, 2025Updated 3 months ago
- ☆13Sep 28, 2024Updated last year
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 8 months ago
- Start here! This repository contains the core prefab functionality for interpreting pixels from captured screenshots.☆10Oct 24, 2014Updated 11 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆11Mar 2, 2019Updated 6 years ago
- Solutions to Problems from the Hackerrank Math 🧮 Domain.☆13Aug 4, 2022Updated 3 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Some tools i made for personal use☆10Mar 15, 2024Updated last year
- ☆12Jun 1, 2024Updated last year
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- ☆37Mar 3, 2025Updated 11 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Dec 15, 2023Updated 2 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Feb 18, 2023Updated 2 years ago
- Public open-source code of malware Shamoon (aka Disttrack).☆39May 28, 2015Updated 10 years ago