behas / ransomware-dataset
Economics of Ransomware | Dataset
☆15Updated 7 years ago
Alternatives and similar repositories for ransomware-dataset
Users that are interested in ransomware-dataset are comparing it to the libraries listed below
Sorting:
- ☆22Updated 4 years ago
- Open YARA scan- and search engine☆23Updated 2 months ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆15Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- A mini project to exfiltrate data via QR codes☆19Updated last month
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Frontend for MalShare.com☆16Updated 3 months ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- HoneyDB Python Module☆13Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆9Updated 11 months ago
- ☆24Updated 2 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- Static configuration extractor for the Karton framework☆10Updated 4 months ago
- ☆13Updated 4 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆18Updated 4 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 3 months ago