behas / ransomware-dataset
Economics of Ransomware | Dataset
☆15Updated 6 years ago
Alternatives and similar repositories for ransomware-dataset:
Users that are interested in ransomware-dataset are comparing it to the libraries listed below
- ☆22Updated 4 years ago
- Open YARA scan- and search engine☆22Updated 2 months ago
- ☆13Updated 4 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- Minimal Indicator Storage System☆11Updated 4 years ago
- Yara filetype plugin for Vim.☆14Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- ☆14Updated 6 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- ☆12Updated 3 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- ☆24Updated 2 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 8 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆15Updated last year
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Python wrapper for the Mitre ATT&CK framework API☆28Updated 7 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Educational ransomware for evaluating ransomware detection tools☆8Updated last year
- Conceptual Methods for Finding Commonalities in Macho Files☆13Updated last year
- various slides and presentations I've worked on☆18Updated last month
- open source malware analysis and research notes dump☆26Updated last year