Google
×
Past year
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
May 3, 2024 · This repository contains 130 malware and ransomware samples for research and analysis purposes. - ThatSINEWAVE/Malware-Samples.
Jul 31, 2024 · The following repository is one of the few malware collections on GitHub. Almost every sample here is malicious, so you should neither execute them on real ...
Dec 16, 2023 · K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) ...
Jan 17, 2024 · Petya malware is a type of ransomware that started in 2017. It locks up important data and demands money to unlock it.
Jul 15, 2024 · Ransomware is a type of malware that permanently blocks access to the victim's personal data unless a "ransom" is paid. While some simple ransomware may ...
Nov 18, 2024 · Ransomware, a type of malicious software or malware, is designed to deny access to computer systems or sensitive data until ransom is paid.
Jan 15, 2024 · The format used for creating and editing in the Attack Flow Builder. JSON (.json). The machine-readable format for exchanging flows. Graphviz (.dot). An example ...
Missing: Petya | Show results with:Petya
Nov 21, 2024 · To address these threats, cyber security professionals must have the ability to accurately and quickly detect potential hazards and identify ongoing attacks.
Jan 16, 2024 · A list of known (documented, reported) attacks involving compromises of software supply chains (from latest to oldest).
Missing: Petya | Show results with:Petya
Apr 22, 2024 · The rapid growth of the Industrial Internet of Things (IIoT) has opened up new avenues for cyber threats, with ransomware being a primary area of concern.