MedusaBinary instrumentation framework based on FRIDA
Stars: ✭ 258 (+732.26%)
MultiAV2MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling
Stars: ✭ 30 (-3.23%)
Horus-EyeJust Simple Code To Play With Android Payloads (;
Stars: ✭ 54 (+74.19%)
GonnacryA Linux Ransomware
Stars: ✭ 341 (+1000%)
RansomwareA POC Windows crypto-ransomware (Academic)
Stars: ✭ 504 (+1525.81%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (+177.42%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+170.97%)
simple-ransomwareSimple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!
Stars: ✭ 29 (-6.45%)
ThorA Simple Ransomware
Stars: ✭ 37 (+19.35%)
RaasnetOpen-Source Ransomware As A Service for Linux, MacOS and Windows
Stars: ✭ 371 (+1096.77%)
goMS17-010Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
Stars: ✭ 67 (+116.13%)
Lime RatLimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+2038.71%)
PhirauteeA proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (+209.68%)
Hosts🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
Stars: ✭ 19,363 (+62361.29%)
Malware SamplesA collection of malware samples caught by several honeypots i manage
Stars: ✭ 863 (+2683.87%)
nemucod decryptRuby tool to decrypt Nemucod ransomware
Stars: ✭ 21 (-32.26%)
ApklabAndroid Reverse-Engineering Workbench for VS Code
Stars: ✭ 470 (+1416.13%)
RansomwareCrypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.
Stars: ✭ 19 (-38.71%)
gitavscanGit Anti-Virus Scan Action - Detect trojans, viruses, malware & other malicious threats.
Stars: ✭ 23 (-25.81%)
Malware-DetectionDeep Learning Based Android Malware Detection Framework
Stars: ✭ 29 (-6.45%)
Edge2GuardCode for PerCom Workshop paper title 'Edge2Guard: Botnet Attacks Detecting Offline Models for Resource-Constrained IoT Devices'
Stars: ✭ 16 (-48.39%)
EngineDroidefense: Advance Android Malware Analysis Framework
Stars: ✭ 386 (+1145.16%)
minerchkBash script to Check for malicious Cryptomining
Stars: ✭ 36 (+16.13%)
HblockImprove your security and privacy by blocking ads, tracking and malware domains.
Stars: ✭ 724 (+2235.48%)
TweetFeedCollecting IOCs posted on Twitter
Stars: ✭ 181 (+483.87%)
StoqAn open source framework for enterprise level automated analysis.
Stars: ✭ 352 (+1035.48%)
petya keyA decoder for Petya victim keys, using the Janus' masterkey.
Stars: ✭ 35 (+12.9%)
BlocklistsaggregatorA Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.
Stars: ✭ 20 (-35.48%)
Ransomware-ReportsThis repo is a collection of Ransomware reports from vendors, researchers, etc.
Stars: ✭ 90 (+190.32%)
EmocheckEmotet detection tool for Windows OS
Stars: ✭ 334 (+977.42%)
csbdThe repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios"
Stars: ✭ 20 (-35.48%)
Ultimate.hosts.blacklistThe Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.
Stars: ✭ 606 (+1854.84%)
JavaRansomwareSimple Ransomware Tool in Pure Java
Stars: ✭ 99 (+219.35%)
CryptskyA simple, fully python ransomware PoC
Stars: ✭ 304 (+880.65%)
d9scanNetwork Scanner with Backdoor Detection, other Nmap resources and syn-protection detection
Stars: ✭ 23 (-25.81%)
SupergirloncryptCryptoTrojan in Python (For educational purpose ONLY)
Stars: ✭ 28 (-9.68%)
malware-writeupsPersonal research and publication on malware families
Stars: ✭ 104 (+235.48%)
DrltraceDrltrace is a library calls tracer for Windows and Linux applications.
Stars: ✭ 282 (+809.68%)
malware-prediction-rnnRNN implementation with Keras for machine activity data to predict malware
Stars: ✭ 35 (+12.9%)
MalwaresourcecodeCollection of malware source code for a variety of platforms in an array of different programming languages.
Stars: ✭ 8,666 (+27854.84%)
adv-dnn-ens-malwareadversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (+6.45%)
CrypterCrypter - Python3 based builder and ransomware compiled to Windows executable using PyInstaller
Stars: ✭ 268 (+764.52%)
yaraMalice Yara Plugin
Stars: ✭ 27 (-12.9%)
Batch-AntivirusBatch Antivirus, a powerful antivirus suite written in batch with real-time protection and heuristical scanning.
Stars: ✭ 26 (-16.13%)
MeltingPotA tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.
Stars: ✭ 23 (-25.81%)
FclFCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (+1219.35%)
ransomwareA ransomware implementation just for educational purpose
Stars: ✭ 14 (-54.84%)
Petya greenApplication for random attack on Green Petya's key
Stars: ✭ 21 (-32.26%)
Dagdaa tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
Stars: ✭ 820 (+2545.16%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+1148.39%)
markransomSimple but sharp ransomware
Stars: ✭ 25 (-19.35%)