julupu / jamsomware
Educational ransomware for evaluating ransomware detection tools
☆8Updated last year
Alternatives and similar repositories for jamsomware:
Users that are interested in jamsomware are comparing it to the libraries listed below
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73Updated last year
- ☆27Updated 4 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- ☆35Updated 3 years ago
- Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects i…☆11Updated 6 years ago
- A new idea to build an anti ransomware☆23Updated 4 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 7 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Updated 3 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆13Updated 3 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- Malware captured with honeypots☆38Updated 7 years ago
- A curated list of Ransomware IoCs and Decryptors☆10Updated 3 years ago
- Ransomware without the ransom | Targeted at Linux systems☆8Updated 7 years ago
- ☆23Updated 4 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Reversed source code to the Babuk ransomware builder.☆18Updated 3 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆18Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- A simple "ransomware" using powershell☆14Updated 3 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆15Updated last year
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago
- Some YARA rules i will add from time to time☆64Updated 2 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 8 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Updated 2 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆21Updated 3 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 5 years ago
- Yara rules☆21Updated 2 years ago
- Malquarium - Modern Malware Repository☆47Updated last month