ryancor / mock-ransomwareLinks
Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects into user-mode processes
☆11Updated 6 years ago
Alternatives and similar repositories for mock-ransomware
Users that are interested in mock-ransomware are comparing it to the libraries listed below
Sorting:
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- HTTP BOTNET☆8Updated 2 years ago
- medium-rare☆28Updated 5 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆18Updated 4 years ago
- Fileless Ransomware Example☆36Updated 7 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Updated 3 years ago
- A python script that can detect and parse loki-bot (malware) related network traffic. This script can be helpful to DFIR analysts and sec…☆13Updated 3 years ago
- Evil Reflective DLL Injection Finder☆47Updated 6 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- Twitter Bot to perform advanced search and automated response☆13Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- PoC malware built by copy-paste☆25Updated 4 years ago
- Various scripts for different malware families☆106Updated 4 years ago
- Random source codes☆25Updated 4 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Updated 6 years ago
- A C# DLL to Dump LSA Secrets☆57Updated 7 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- VBA Reversed TCP Meterpreter Stager☆62Updated 7 years ago
- Malware captured with honeypots☆38Updated 7 years ago
- InfoPath Phishing Repo Resource☆69Updated 7 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆43Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆45Updated 8 years ago
- ☆23Updated 4 years ago
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Updated 10 months ago