Curated list of enterprise ransomware defense resources
☆14Apr 8, 2022Updated 3 years ago
Alternatives and similar repositories for ransomware
Users that are interested in ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curated list of ransomware-related resources; awesome style.☆32Jan 17, 2025Updated last year
- Windows Ransomware Detection and Protection, Published by Packt☆11Mar 18, 2023Updated 3 years ago
- A poc to demonstrate how ransomware can spread to enterprise apps through libraries☆11Mar 28, 2018Updated 7 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Extension to Archi application to enable Azure diagram creation in Archimate☆15May 17, 2021Updated 4 years ago
- ☆14Sep 8, 2017Updated 8 years ago
- A library to edit Apple IPSW files.☆12Oct 10, 2023Updated 2 years ago
- Static analysis tool that detects potential ransomware in PE and ELF files through heuristic analysis☆20Jan 16, 2024Updated 2 years ago
- This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware e…☆11Aug 14, 2020Updated 5 years ago
- FireRTC Caller ID Changer allows you to easily change your Caller ID in the free online phone software "FireRTC".☆15Sep 9, 2017Updated 8 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- Read digital certificate (pfx and p12 files) in Python☆18May 3, 2024Updated last year
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- Files required to convert ubuntu intune deb packages to fedora rpms☆11Jan 24, 2025Updated last year
- All the info you need.☆21Aug 14, 2023Updated 2 years ago
- Generate masscan configuration files for lat/long and Areas. Useful for scanning specific areas.☆20Jun 30, 2020Updated 5 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 10 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- ☆32Jan 12, 2026Updated 2 months ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
-  # Ukraine-Cyber-Operations Cura…☆28Mar 4, 2022Updated 4 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Work in progress porting my blog software to Common Lisp☆10Sep 18, 2019Updated 6 years ago
- SpreadTrumTools to generate bootloader unlock file☆15Mar 7, 2020Updated 6 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆14Mar 1, 2024Updated 2 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- A Windows Logon / Startup / Scheduled Task Script for Ransomware Detection & Early-Warning☆38Nov 18, 2019Updated 6 years ago
- An OTA App Distribution System for iOS and Android apps☆27Sep 4, 2021Updated 4 years ago