☆58Jul 2, 2017Updated 8 years ago
Alternatives and similar repositories for malware-collection
Users that are interested in malware-collection are comparing it to the libraries listed below
Sorting:
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Jul 8, 2021Updated 4 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Decompiled NotPetya File Encryptor Code☆18Aug 23, 2022Updated 3 years ago
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆18Apr 12, 2022Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- I created my own Keylogger I am going to open source its code .But no one is allowed to use it commercially and I have actual copy right…☆11Sep 30, 2017Updated 8 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- Curated list of ransomware-related resources; awesome style.☆32Jan 17, 2025Updated last year
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated last month
- Welcome to my Database of Malware!☆33Dec 30, 2023Updated 2 years ago
- The Ranflood ransomware contrast tool☆17Dec 18, 2024Updated last year
- ☆28Feb 7, 2021Updated 5 years ago
- This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware e…☆11Aug 14, 2020Updated 5 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Oct 17, 2023Updated 2 years ago
- cms识别☆13Dec 2, 2017Updated 8 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- A C# Source Generator for obfuscating string or byte array values using multi-byte xor encryption.☆14Jun 12, 2024Updated last year
- ☆35Sep 25, 2020Updated 5 years ago
- ☆18Nov 18, 2020Updated 5 years ago
- Ransomware Decryptors☆35Apr 28, 2022Updated 3 years ago
- Mastering Malware Analysis, published by Packt☆41Jan 18, 2023Updated 3 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆61Apr 14, 2022Updated 3 years ago
- A repository of dumb but funny malware... made my me and some friends :D☆13Nov 5, 2023Updated 2 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- A Ransomware Based in AES256 Algorithm☆17Jul 28, 2022Updated 3 years ago
- It's my First GDI Virus with MBR Overwriting... Enjoy :D☆14May 8, 2022Updated 3 years ago
- Source codes of malwares, stress tests etc. for computer.☆38Feb 2, 2020Updated 6 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆22Jan 25, 2022Updated 4 years ago
- Static analysis tool that detects potential ransomware in PE and ELF files through heuristic analysis☆20Jan 16, 2024Updated 2 years ago
- An advanced Ransomware written in C++ and fully customizable☆96Sep 30, 2023Updated 2 years ago
- Evil Twin Attack Bash script☆12Feb 21, 2016Updated 10 years ago
- Simple Application Restore Obfuscated Calls Made By Agile.Net (CilSecure)☆16Jun 28, 2022Updated 3 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago