bstnbuck / ItsSoEasyLinks
A Linux/Windows Ransomware PoC written in Python, Go and C
☆16Updated 2 years ago
Alternatives and similar repositories for ItsSoEasy
Users that are interested in ItsSoEasy are comparing it to the libraries listed below
Sorting:
- ☆28Updated 5 years ago
- ☆27Updated 3 years ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- Collaborative malware exchange repository.☆34Updated last year
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆21Updated 5 years ago
- Notes and IoCs of fresh malware☆61Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- ☆35Updated 4 years ago
- Curated list of enterprise ransomware defense resources☆14Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 4 years ago
- ProcDot Malware Sandbox☆26Updated 6 months ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- Handy script to automate the attack☆22Updated 6 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Python, C++ and Go☆22Updated 3 years ago
- bad stuffs by bad guys☆49Updated 3 years ago
- Windows Malware Probe of Concept☆21Updated 3 years ago
- ☆37Updated 11 months ago
- Conti Ransomware Source Code☆19Updated 3 years ago
- ☆23Updated 2 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Updated 4 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 4 months ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- Collection of generic YARA rules☆16Updated 5 months ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆17Updated 10 months ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15Updated 2 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago