julupu / jamsomware
Educational ransomware for evaluating ransomware detection tools
☆8Updated last year
Alternatives and similar repositories for jamsomware:
Users that are interested in jamsomware are comparing it to the libraries listed below
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73Updated last year
- ☆27Updated 4 years ago
- Ransomware Decryptors☆34Updated 2 years ago
- A new idea to build an anti ransomware☆23Updated 4 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆15Updated last year
- A curated list of Ransomware IoCs and Decryptors☆10Updated 3 years ago
- Ransomware without the ransom | Targeted at Linux systems☆8Updated 7 years ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Malware captured with honeypots☆38Updated 7 years ago
- ☆34Updated 2 years ago
- Reversed source code to the Babuk ransomware builder.☆17Updated 3 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Updated 3 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 7 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 6 months ago
- Ransomware Detection Test PowerShell Script☆10Updated 7 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Collaborative malware exchange repository.☆33Updated 4 months ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Updated 4 years ago
- Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects i…☆11Updated 6 years ago
- Reversed source code of the Babuk Ransomware Version 1☆18Updated 3 years ago
- Hashes of infamous malware☆26Updated last year
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆12Updated 2 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Updated 4 years ago
- ☆9Updated 2 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 3 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Updated 2 years ago