Trending repositories for topic ransomware
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz
A resource containing all the tools each ransomware gangs uses
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web ...
An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz
A resource containing all the tools each ransomware gangs uses
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web ...
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
A resource containing all the tools each ransomware gangs uses
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web ...
An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz
Improve your security and privacy by blocking ads, tracking and malware domains.
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester cred...
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
Z-Ransom (Create Android Ransomware In Kali linux and Termux (NO ROOT)
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
A resource containing all the tools each ransomware gangs uses
Z-Ransom (Create Android Ransomware In Kali linux and Termux (NO ROOT)
An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web ...
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester cred...
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
A resource containing all the tools each ransomware gangs uses
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web ...
Improve your security and privacy by blocking ads, tracking and malware domains.
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester cred...
Crypter - Python3 based builder and ransomware compiled to Windows executable using PyInstaller
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
A resource containing all the tools each ransomware gangs uses
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️
Z-Ransom (Create Android Ransomware In Kali linux and Termux (NO ROOT)
An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz
Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentionally introduced by the leaker to prevent the locker from being b...
functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forgery (SSRF), and Path Traversal.
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
ساخت پروفایل برای وصل انتن ایفون بدون رجیستر 🦹♀️ Configuration Profile Generator
𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability Exploit Called "EternalBlue".
[ICSE'24] Latest 7,796 active and unique ransomware samples from 95 families. Code is in another repository. 勒索软件数据破坏攻击分析
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
A resource containing all the tools each ransomware gangs uses
Improve your security and privacy by blocking ads, tracking and malware domains.
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web ...
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester cred...
A collection of malware samples caught by several honeypots i manage
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.
An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target ser...
ساخت پروفایل برای وصل انتن ایفون بدون رجیستر 🦹♀️ Configuration Profile Generator
A resource containing all the tools each ransomware gangs uses
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
🐝 Ransomware Detection using Machine Learning with eBPF for Linux.
Android malware source code dataset collected from public resources.
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.