behas / ransomware-datasetLinks
Economics of Ransomware | Dataset
☆15Updated 7 years ago
Alternatives and similar repositories for ransomware-dataset
Users that are interested in ransomware-dataset are comparing it to the libraries listed below
Sorting:
- ☆22Updated 4 years ago
- Open YARA scan- and search engine☆23Updated 3 months ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- Frontend for MalShare.com☆16Updated 3 weeks ago
- ☆13Updated 4 years ago
- Hash collisions and their exploitations☆9Updated 3 years ago
- ☆12Updated 3 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- ☆14Updated 7 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- HoneyDB Python Module☆13Updated last year
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- A mini project to exfiltrate data via QR codes☆19Updated last week
- Plugins for the Viper Framework☆14Updated 5 years ago
- Educational ransomware for evaluating ransomware detection tools☆8Updated 2 years ago
- Yara filetype plugin for Vim.☆14Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- Download a Bunch of Malware for Demos and Testing☆13Updated 6 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- ☆23Updated 4 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago