Ransomware
by Err0r-ICA
A curated collection of ransomware samples designed for malware analysis and threat hunting purposes.
Ransomwares Collection. Don't Run Them on Your Device.
Primary Use Case
This tool serves as a dataset of ransomware samples for security researchers, malware analysts, and threat hunters to study ransomware behavior and develop detection or mitigation strategies. It is intended strictly for analysis and educational purposes, not for deployment on production devices.
- Comprehensive collection of ransomware samples
- Supports exploitation tools and malware analysis workflows
- Facilitates threat hunting activities
- Command-line interface usage
- Compatible with multiple Linux distributions and Termux
- Open source under MIT license
- Coded in Python
Installation
- git clone https://github.com/Err0r-ICA/Ransomware
- cd Ransomware
- python3 Ransomware
Usage
>_ python3 RansomwareRuns the ransomware collection tool/script for analysis or interaction.
- Integrate ransomware samples into sandbox environments for dynamic behavior analysis.
- Use the dataset to train machine learning models for ransomware detection and classification.
- Leverage samples to simulate ransomware attacks in purple team exercises to improve detection and response.
- Combine with threat intelligence feeds to enrich indicators of compromise (IOCs) for proactive hunting.
- Automate extraction of ransomware behaviors to update endpoint detection and response (EDR) rules.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about Ransomware. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
This tool hasn't been indexed yet. Request indexing to enable AI chat.
Admin will review your request within 24 hours
Related Tools
x64dbg
x64dbg/x64dbg
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
theZoo
ytisf/theZoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
flare-vm
mandiant/flare-vm
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
capa
mandiant/capa
The FLARE team's open-source tool to identify capabilities in executable files.
retoolkit
mentebinaria/retoolkit
Reverse Engineer's Toolkit
awesome-yara
InQuest/awesome-yara
A curated list of awesome YARA rules, tools, and people.
