GonnacryA Linux Ransomware
Stars: ✭ 341 (+12.17%)
BlackwebDomains Blocklist for Squid-Cache
Stars: ✭ 189 (-37.83%)
CypherPythonic ransomware proof of concept.
Stars: ✭ 178 (-41.45%)
DeathransomA ransomware developed in python, with bypass technics, for educational purposes.
Stars: ✭ 126 (-58.55%)
UmbraA LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malware and more.
Stars: ✭ 98 (-67.76%)
Ultimate.hosts.blacklistThe Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.
Stars: ✭ 606 (+99.34%)
Malware SamplesA collection of malware samples caught by several honeypots i manage
Stars: ✭ 863 (+183.88%)
Lime RatLimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+118.09%)
BlockLet's make an annoyance free, better open internet, altogether!
Stars: ✭ 1,849 (+508.22%)
JavaRansomwareSimple Ransomware Tool in Pure Java
Stars: ✭ 99 (-67.43%)
CrypterCrypter - Python3 based builder and ransomware compiled to Windows executable using PyInstaller
Stars: ✭ 268 (-11.84%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (-7.57%)
BlocklistsaggregatorA Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.
Stars: ✭ 20 (-93.42%)
RansomwareCrypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.
Stars: ✭ 19 (-93.75%)
Hosts🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
Stars: ✭ 19,363 (+6269.41%)
EngineDroidefense: Advance Android Malware Analysis Framework
Stars: ✭ 386 (+26.97%)
The Big List Of Hacked Malware Web SitesThis repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
Stars: ✭ 125 (-58.88%)
HblockImprove your security and privacy by blocking ads, tracking and malware domains.
Stars: ✭ 724 (+138.16%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+27.3%)
RansomwareA POC Windows crypto-ransomware (Academic)
Stars: ✭ 504 (+65.79%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-68.42%)
MalwareRootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (-48.68%)
MalwareHashDBMalware hashes for open source projects.
Stars: ✭ 31 (-89.8%)
MalwareDatabaseMalware samples for analysis, researchers, anti-virus and system protection testing.(1300+ Malware-samples!)
Stars: ✭ 21 (-93.09%)
InfectpeInfectPE - Inject custom code into PE file [This project is not maintained anymore]
Stars: ✭ 266 (-12.5%)
Adamantium Thief🔑 Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, autofill. Version > 80 is supported.
Stars: ✭ 283 (-6.91%)
AutoIt-RipperExtract AutoIt scripts embedded in PE binaries
Stars: ✭ 101 (-66.78%)
MqueryYARA malware query accelerator (web frontend)
Stars: ✭ 264 (-13.16%)
ips-bph-frameworkBLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a Command-and-Control (C&C) architecture
Stars: ✭ 21 (-93.09%)
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (-13.49%)
MalScanA Simple PE File Heuristics Scanners
Stars: ✭ 41 (-86.51%)
MSEMalware sample exchange system and API intended for Anti-Virus companies and researchers.
Stars: ✭ 14 (-95.39%)
Ghostshell Malware indetectable, with AV bypass techniques, anti-disassembly, etc.
Stars: ✭ 293 (-3.62%)
Nt wrapperA wrapper library around native windows sytem APIs
Stars: ✭ 287 (-5.59%)
SimpleatorSimpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that were added in Windows 10 Spring Update (1803), also called "Redstone 4", with additional improvements that were made in Windows 10 October Update (1809), aka "Redstone 5".
Stars: ✭ 260 (-14.47%)
ransomwareA ransomware implementation just for educational purpose
Stars: ✭ 14 (-95.39%)
mitre-visualizer🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (-83.88%)
CommunityVolatility plugins developed and maintained by the community
Stars: ✭ 252 (-17.11%)
fake-sandbox👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.
Stars: ✭ 110 (-63.82%)
Freki🐺 Malware analysis platform
Stars: ✭ 285 (-6.25%)
TeleShadow2TeleShadow - Telegram Desktop Session Stealer (Windows)
Stars: ✭ 88 (-71.05%)
ph-malhideProcess Hacker 2 hiding from external applications
Stars: ✭ 17 (-94.41%)
VitalMalware for Discord, designed to steal passwords, tokens, and inject discord folders for long-term use.
Stars: ✭ 50 (-83.55%)
Hack-UtilsScript to facilitate different functions and checks
Stars: ✭ 27 (-91.12%)
RagnarokVirus Package ( For Educational Purposes )
Stars: ✭ 23 (-92.43%)
Phishing.databasePhishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Stars: ✭ 296 (-2.63%)
Vxug PapersResearch code & papers from members of vx-underground.
Stars: ✭ 291 (-4.28%)
Misp GalaxyClusters and elements to attach to MISP events or attributes (like threat actors)
Stars: ✭ 276 (-9.21%)
M-BotnetA C2 project that controls a self-propagating MS17-010 worm.
Stars: ✭ 39 (-87.17%)
apooxmlGenerate YARA rules for OOXML documents.
Stars: ✭ 34 (-88.82%)
YobiYara Based Detection Engine for web browsers
Stars: ✭ 39 (-87.17%)
markransomSimple but sharp ransomware
Stars: ✭ 25 (-91.78%)