[ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks
☆14Mar 1, 2024Updated 2 years ago
Alternatives and similar repositories for MarauderMap-code
Users that are interested in MarauderMap-code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ICSE'24] Latest 7,796 active and unique ransomware samples from 95 families. Code is in another repository. 勒索软件数据破坏攻击分析☆31Mar 1, 2024Updated 2 years ago
- MLRan: A Ransomware Behavioural Dataset for Machine Learning☆46Jun 17, 2025Updated 9 months ago
- Suspend and resume processes by using functions in ntdll.dll.☆15Feb 23, 2014Updated 12 years ago
- Ransomware Dataset for arXiv:1609.03020☆30Dec 29, 2021Updated 4 years ago
- Overwrite MBR and add own custom message☆16Apr 1, 2020Updated 5 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆30Mar 15, 2024Updated 2 years ago
- windows kernel pagehook☆42Oct 30, 2022Updated 3 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Record & prevent file deletion in kernel mode☆46Jul 22, 2020Updated 5 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Dec 16, 2020Updated 5 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆13May 30, 2024Updated last year
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- Code to Implement the Smooth Euler Characteristic Transform (SECT)☆12Oct 22, 2019Updated 6 years ago
- PINTool to help analyzing malware that uses process injection☆16Jan 3, 2022Updated 4 years ago
- This repository contains the pytorch code for our BMVC 2022 paper "BaseTransformers: Attention over base data-points for One Shot Learnin…☆13Mar 20, 2024Updated 2 years ago
- ☆11Dec 17, 2024Updated last year
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆11Nov 30, 2024Updated last year
- Labs for deep learning courses at UPC ETSETB TelecomBCN.☆17Mar 17, 2026Updated last week
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- Small and lightweight x86-64 VBR bootkit for research purposes☆10Dec 7, 2022Updated 3 years ago
- ☆21Feb 18, 2025Updated last year
- A DL compiler fuzzer☆14Nov 1, 2024Updated last year
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- ☆12Nov 10, 2020Updated 5 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- 多方安全计算技术&联邦学习相关/Multi party security computing technology federated learning☆18Feb 18, 2024Updated 2 years ago
- Wrapper for borgbackup to easily use in code☆19Feb 4, 2026Updated last month
- Procmonel is Procmon like monitoring system implemented using Microsoft WDK☆13Dec 25, 2019Updated 6 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Apr 1, 2018Updated 7 years ago
- Find context neurons in Pythia models.☆13Jun 13, 2023Updated 2 years ago
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- Fuzzing Coreutils with AFL on kubernetes☆13Apr 25, 2019Updated 6 years ago