ryancor / mock-ransomwareView external linksLinks
Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects into user-mode processes
☆12Dec 27, 2018Updated 7 years ago
Alternatives and similar repositories for mock-ransomware
Users that are interested in mock-ransomware are comparing it to the libraries listed below
Sorting:
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- ☆12Aug 27, 2017Updated 8 years ago
- ☆12Jul 17, 2017Updated 8 years ago
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆30May 7, 2024Updated last year
- CyxvcProtect packer written with C++☆22Nov 13, 2017Updated 8 years ago
- A minimal IRC server☆20Jul 27, 2024Updated last year
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Regain device access if denied/disabled by other programs (esp. device control programs, ransomware)☆12Dec 13, 2019Updated 6 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- Crossplatform hex editor intended mainly for reverse-engineering and data analysis☆10Mar 10, 2018Updated 7 years ago
- Hax That F#uck Html Page☆10Mar 13, 2018Updated 7 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆11Apr 18, 2017Updated 8 years ago
- Telegram Bot, Anonymous Message, بات تلگرام☆10May 19, 2018Updated 7 years ago
- Bash one-liners for great justice!☆12Feb 9, 2019Updated 7 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- A simple polymorphic engine☆44Aug 8, 2019Updated 6 years ago
- ALLES! CTF 2020 Challenges☆10Sep 21, 2020Updated 5 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆13Aug 7, 2016Updated 9 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Aug 8, 2023Updated 2 years ago
- Hijack a dll in a process to do something.☆14Aug 21, 2020Updated 5 years ago
- Project that aims to let student teams write their own virus which must not be detected by team self-developped antivirus.☆13Mar 19, 2013Updated 12 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- Python source random obfuscation☆11Sep 9, 2022Updated 3 years ago
- A small utility to run raw code chunks in the executable memory area.☆17Feb 6, 2015Updated 11 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- study launch anywhere and bundle mismatch bug☆16Apr 23, 2023Updated 2 years ago