sokcryptojacking / SoK
SoK: Cryptojacking Malware
☆38Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for SoK
- Resources for our (extended) version of our IMC Crypto-Mining Malware paper☆30Updated 4 years ago
- A collection of malware samples.☆34Updated 6 years ago
- Popular Malware-Samples for research and educational purposes.(60+ Samples!)☆36Updated 2 years ago
- Android Malware Samples☆74Updated 3 years ago
- Python-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots a…☆58Updated 5 years ago
- A Linux Cyptomining malware☆36Updated last year
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆152Updated 3 years ago
- Cyber Warfare is a free and open source international intrusion detection and prevention advisory☆15Updated 3 months ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆30Updated last year
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆65Updated 2 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code☆285Updated 3 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆25Updated 3 years ago
- Malware samples for analysis, researchers, anti-virus and system protection testing (1600+ Malware-samples!).☆168Updated last year
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆21Updated 7 years ago
- A database of RAT collected from Internet☆148Updated 4 years ago
- Malware Repository 2018☆40Updated 9 months ago
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆12Updated 3 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆81Updated 7 years ago
- [Mirai] Mirai Iot Botnet && Tutorial !☆267Updated 3 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆29Updated 8 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆96Updated 3 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- Codes for malware, viruses and key-logger and other tools☆29Updated 3 years ago
- Community driven computer worm☆58Updated 2 years ago
- Ransomware builder☆84Updated 4 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆43Updated 2 years ago
- Complete Python RansomeWare Source Code With Full Decoumetions.☆209Updated last year
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆18Updated 9 months ago
- Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful!☆151Updated 3 years ago