f6-dfir / RansomwareLinks
☆29Updated this week
Alternatives and similar repositories for Ransomware
Users that are interested in Ransomware are comparing it to the libraries listed below
Sorting:
- The best powershell obfuscator ever made☆112Updated 3 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 6 months ago
- Yandex browser password recovery☆11Updated 6 months ago
- Advanced dynamic malware analysis tool.☆82Updated last year
- Analyse MSI files for vulnerabilities☆138Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Updated 9 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 7 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆58Updated 2 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆20Updated 6 months ago
- This is a collection of Worms for educational purposes☆33Updated 3 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆72Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆57Updated last month
- Decrypting yandex browser passwords☆26Updated 6 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- ☆70Updated 9 months ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆26Updated 10 months ago
- ☆41Updated last year
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆23Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆88Updated 8 months ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆60Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆85Updated 6 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 3 months ago
- a small wiper malware programmed in c#☆58Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆102Updated 5 months ago
- ☆26Updated 7 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆136Updated last year
- Keygen for Positive Technologies Network Attack Detector☆31Updated last year