Past year
All results
- All results
- Verbatim
May 3, 2024 · This repository contains 130 malware and ransomware samples for research and analysis purposes. - ThatSINEWAVE/Malware-Samples.
Dec 16, 2023 · K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) ...
Jan 17, 2024 · Petya malware is a type of ransomware that started in 2017. It locks up important data and demands money to unlock it.
Jul 15, 2024 · Ransomware is a type of malware that permanently blocks access to the victim's personal data unless a "ransom" is paid. While some simple ransomware may ...
Nov 18, 2024 · Ransomware, a type of malicious software or malware, is designed to deny access to computer systems or sensitive data until ransom is paid.
Jan 15, 2024 · The format used for creating and editing in the Attack Flow Builder. JSON (.json). The machine-readable format for exchanging flows. Graphviz (.dot). An example ...
Missing: Petya | Show results with:Petya
Jun 4, 2024 · The earliest ransomware attacks simply demanded a ransom in exchange for the encryption key needed to regain access to the affected data or use of the infected ...
Jan 16, 2024 · A list of known (documented, reported) attacks involving compromises of software supply chains (from latest to oldest).
Missing: Petya | Show results with:Petya
Nov 21, 2024 · To address these threats, cyber security professionals must have the ability to accurately and quickly detect potential hazards and identify ongoing attacks.