☆15Jun 5, 2019Updated 6 years ago
Alternatives and similar repositories for cryptomix-clop-ransomware
Users that are interested in cryptomix-clop-ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- A decryptor for systems infected by Avaddon ransomware.☆25Oct 29, 2024Updated last year
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆24Jan 24, 2020Updated 6 years ago
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago
- ☆24Apr 10, 2024Updated last year
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Miscellaneous Malware RE☆193May 1, 2022Updated 3 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- ida python scripts☆23Jul 23, 2018Updated 7 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- Educational Java Bot Virus☆10Mar 14, 2020Updated 6 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- edge --> powerpoint --> remote-file --> shell☆12May 17, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Mar 12, 2021Updated 5 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Yet another rule generator for Yara☆29Jun 6, 2025Updated 9 months ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- Community-based integrated malware identification system☆81Dec 10, 2022Updated 3 years ago
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Jan 5, 2022Updated 4 years ago
- My Malware Analysis Reports☆25May 24, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Joker Botnet Source LEAKED☆10Jun 5, 2021Updated 4 years ago
- Exploits I've authored☆60Aug 13, 2019Updated 6 years ago
- ☆136Jan 24, 2019Updated 7 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- An example of PE hollowing injection technique☆26Jun 28, 2019Updated 6 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆15Sep 29, 2020Updated 5 years ago