Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As A Service and Ransomware protection technologies
☆34Jun 29, 2021Updated 4 years ago
Alternatives and similar repositories for Ransomware
Users that are interested in Ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Swiss Army Knife for your system, portable and lightweight. Only for 5mb!!☆16Oct 4, 2023Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware yo…☆14Jan 29, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ransomware groups posts☆44Updated this week
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆120Sep 9, 2022Updated 3 years ago
- 安全相关思维导图收集整理☆17Apr 16, 2019Updated 7 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆24Jan 25, 2022Updated 4 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- Source code of the Rensenware ransomware in .NET☆20Jul 24, 2021Updated 4 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆61Mar 4, 2023Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆12Jun 10, 2022Updated 3 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 3 years ago
- This repo provide rule groups for Little Snitch based on unified host list to block ads, malware, fake news , gambling and porn☆28Updated this week
- BlowBeef is a tool for analyzing WMI data.☆18Jul 26, 2021Updated 4 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆56Jun 14, 2021Updated 4 years ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆20Jan 3, 2023Updated 3 years ago
- PowerShell-based Windows Server Security Audit Engine by Cyb3rint3l Labs. Measures alignment with the NIS2 directive and maps findings to…☆44Feb 1, 2026Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆15Apr 10, 2025Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- ☆12Apr 18, 2024Updated 2 years ago
- RPC Monitor based on The ETW Microsoft-Windows-Rpc provider☆24Mar 22, 2020Updated 6 years ago
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆23Oct 1, 2025Updated 7 months ago
- ☆11Jun 15, 2022Updated 3 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆31Jul 6, 2017Updated 8 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆281Mar 1, 2021Updated 5 years ago
- Curated list of ransomware-related resources; awesome style.☆33Jan 17, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆11Jul 6, 2018Updated 7 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- DLL to open up calc.exe to demonstrate that you injected DLLs☆24Nov 29, 2020Updated 5 years ago
- Cs-Sleep-Mask-Fiber☆18May 16, 2025Updated 11 months ago
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated last month
- 利用EFSRPC协议批量探测出网☆67Oct 12, 2023Updated 2 years ago
- Work in progress porting my blog software to Common Lisp☆10Sep 18, 2019Updated 6 years ago