[ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks
☆14Mar 1, 2024Updated 2 years ago
Alternatives and similar repositories for MarauderMap-code
Users that are interested in MarauderMap-code are comparing it to the libraries listed below
Sorting:
- [ICSE'24] Latest 7,796 active and unique ransomware samples from 95 families. Code is in another repository. 勒索软件数据破坏攻击分析☆32Mar 1, 2024Updated 2 years ago
- Hot reload DLL on windows☆11Oct 7, 2018Updated 7 years ago
- Suspend and resume processes by using functions in ntdll.dll.☆15Feb 23, 2014Updated 12 years ago
- Overwrite MBR and add own custom message☆16Apr 1, 2020Updated 5 years ago
- A Windows kernel driver unit testing framework. Provides a macro free modern cpp syntax. Includes tools for automatic running on your vm.☆11May 15, 2023Updated 2 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆12May 30, 2024Updated last year
- ☆10Jul 2, 2020Updated 5 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- windows kernel pagehook☆42Oct 30, 2022Updated 3 years ago
- A DL compiler fuzzer☆14Nov 1, 2024Updated last year
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- Secure Inference Resilient Against Malicious Clients☆15May 3, 2022Updated 3 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- ☆11Dec 17, 2024Updated last year
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- Small and lightweight x86-64 VBR bootkit for research purposes☆10Dec 7, 2022Updated 3 years ago
- Windows Ransomware Detection and Protection, Published by Packt☆11Mar 18, 2023Updated 2 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- A minifilter driver to capture processes behavior from a filesystem prospective.☆16Oct 5, 2024Updated last year
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 3 years ago
- Labs for deep learning courses at UPC ETSETB TelecomBCN.☆17Feb 17, 2026Updated 2 weeks ago
- *This is only for educational purposes, I'm not responsible for anything whatsoever made using those actually malicious software* A malwa…☆13Nov 7, 2021Updated 4 years ago
- This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware e…☆11Aug 14, 2020Updated 5 years ago
- ☆21Feb 18, 2025Updated last year
- 基于UICrawler开源工程,开发的针对android APP 自动化遍历工具,针对hybird或者纯native APP,做深度优先遍历。主要用于监听被抓取APP的页面是否有变动,并生成diff报告☆14Mar 1, 2019Updated 7 years ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- Fuzzing Coreutils with AFL on kubernetes☆13Apr 25, 2019Updated 6 years ago
- Hardware performance counter tool for Windows OS☆17Sep 4, 2018Updated 7 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- MDG-based static vulnerability scanner specialized in analyzing npm packages and detecting taint-style and prototype pollution vulnerabil…☆22Dec 10, 2025Updated 2 months ago
- 🪲 A list of malware and benign datasets for malware research☆32Jan 31, 2026Updated last month
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year