Google
×
Past year
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
May 3, 2024 · Welcome to the Malware-Samples repository! This repository contains various malware and ransomware samples for research and analysis purposes.
Jul 31, 2024 · The following repository is one of the few malware collections on GitHub. Almost every sample here is malicious, so you should neither execute them on real ...
Nov 14, 2024 · An archive of various ransomware samples for reverse engineering and research. - SpiceNWolf/Ransomware-Sample-Database.
Jan 17, 2024 · This blog post examines the Petya ransomware attack, focusing on Petya virus effects, how it spreads, and the risks of paying the ransom.
Nov 18, 2024 · Experts believe the ransomware is tied to the Petya attack in the Ukraine, due to Bad Rabbit's code having many overlapping and analogical elements to the code ...
Oct 25, 2024 · This is NotPetya v2.0, much improved over the earlier version. Our friends at MalwareBytes blogged: "The code has many overlapping elements to the code of Petya ...
Jun 4, 2024 · Ransomware is a type of malware that holds a victim's sensitive data or device hostage, threatening to keep it locked—or worse—unless the victim pays a ransom ...
Aug 3, 2024 · Okami is an advanced toolset developed to enhance malware research and cybersecurity analysis. The core functionality of Okami lies in its ability to export ...
Jul 15, 2024 · Ransomware is a type of malware that permanently blocks access to the victim's personal data unless a "ransom" is paid.
Oct 22, 2024 · NotPetya targeted companies in Ukraine before spreading worldwide. This made it one of history's costliest cyberattacks. CVE-2017-5638: Apache Struts 2 Jakarta ...