Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects into user-mode processes
☆12Dec 27, 2018Updated 7 years ago
Alternatives and similar repositories for mock-ransomware
Users that are interested in mock-ransomware are comparing it to the libraries listed below
Sorting:
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- Windows Ransomware PoC☆15Dec 22, 2019Updated 6 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- ☆12Aug 27, 2017Updated 8 years ago
- Polymorphic virus and anitvirus software for information security team project.☆20Apr 13, 2019Updated 6 years ago
- CyxvcProtect packer written with C++☆22Nov 13, 2017Updated 8 years ago
- ☆27Mar 1, 2017Updated 9 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Chrome Extension☆14Oct 24, 2022Updated 3 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Dockerized deployment of Polr URL shortener☆10Mar 15, 2022Updated 3 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Regain device access if denied/disabled by other programs (esp. device control programs, ransomware)☆12Dec 13, 2019Updated 6 years ago
- Telegram Bot, Anonymous Message, بات تلگرام☆10May 19, 2018Updated 7 years ago
- Bash one-liners for great justice!☆12Feb 9, 2019Updated 7 years ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Hax That F#uck Html Page☆10Mar 13, 2018Updated 7 years ago
- Crossplatform hex editor intended mainly for reverse-engineering and data analysis☆10Mar 10, 2018Updated 7 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- ALLES! CTF 2020 Challenges☆10Sep 21, 2020Updated 5 years ago
- ☆12May 8, 2020Updated 5 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Project that aims to let student teams write their own virus which must not be detected by team self-developped antivirus.☆13Mar 19, 2013Updated 12 years ago
- Hijack a dll in a process to do something.☆14Aug 21, 2020Updated 5 years ago
- A simple polymorphic engine☆45Aug 8, 2019Updated 6 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Aug 8, 2023Updated 2 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆13Aug 7, 2016Updated 9 years ago
- XMRig Service Installer: An automation tool to swiftly set up the xmrig mining software as a background service on Windows. Designed for …☆14Nov 16, 2024Updated last year
- ☆15Aug 12, 2024Updated last year