bstnbuck / ItsSoEasyLinks
A Linux/Windows Ransomware PoC written in Python, Go and C
☆16Updated 2 years ago
Alternatives and similar repositories for ItsSoEasy
Users that are interested in ItsSoEasy are comparing it to the libraries listed below
Sorting:
- ☆27Updated 4 years ago
- Collaborative malware exchange repository.☆33Updated 10 months ago
- ☆24Updated 3 years ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- Curated list of enterprise ransomware defense resources☆14Updated 3 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆35Updated 3 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆64Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Updated last year
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 3 weeks ago
- ☆23Updated 2 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- Script to chain search parameters for MalwareBazaar☆12Updated 8 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 8 months ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Updated 3 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- ☆33Updated 2 years ago
- Dataset of packed ELF samples☆20Updated 2 years ago
- ☆33Updated 10 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago