This repo is a collection of Ransomware reports from vendors, researchers, etc.
☆121Sep 9, 2022Updated 3 years ago
Alternatives and similar repositories for Ransomware-Reports
Users that are interested in Ransomware-Reports are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆33Jun 29, 2021Updated 4 years ago
- Collection of Malware Lures☆23Oct 8, 2021Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆28Feb 7, 2021Updated 5 years ago
- Defences against Cobalt Strike☆1,302Jul 14, 2022Updated 3 years ago
- ☆12May 6, 2020Updated 6 years ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73May 22, 2023Updated 2 years ago
- Null-free shellcode for running calc.exe on Windows x64☆15Mar 24, 2024Updated 2 years ago
- A fast and advanced ransomware PoC☆60Aug 24, 2015Updated 10 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- Malware analysis platform☆447Jan 29, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 恶意软件原理图☆60Mar 29, 2021Updated 5 years ago
- Misc Threat Hunting Resources☆379Jan 26, 2023Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Oct 22, 2021Updated 4 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆968Feb 28, 2026Updated 2 months ago
- Show AV Processes list☆15Sep 30, 2020Updated 5 years ago
- Presentation slides, blogs, and videos of my conference presentations.☆26Jan 31, 2024Updated 2 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,408Nov 7, 2024Updated last year
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆144Jun 21, 2023Updated 2 years ago
- ☆38Mar 3, 2025Updated last year
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 5 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,822Apr 16, 2026Updated last month
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- A malware researching repository.☆20Aug 10, 2021Updated 4 years ago
- IDA plugin to Display Mach-O headers☆21Nov 4, 2011Updated 14 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 11 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆284Mar 1, 2021Updated 5 years ago
- ☆1,136Dec 19, 2023Updated 2 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆586May 5, 2024Updated 2 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago