Showing 270 open source projects for "malware-samples"

View related business solutions
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    FinalCrypt

    FinalCrypt

    FinalCrypt - Unbreakable One-Time Pad Encryption

    Why FinalCrypt? 1. Most people choose Disk-Encryption as it's easier to unlock a whole drive, but Big-Brother or Malware can then also read all your files. Only use File-Encryption! 2. Most software uses recently broken AES encryption. 3. Soon The Shor's algorithm will instantly break all assymmetric encryption with Quantum Computers. 4. FinalCrypt uses Symmetric One Time Pad Encryption, which is the most unbreakable encryption there is. 5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Tiny Watcher

    Tiny Watcher

    Monitors system changes on a Windows machine

    Tiny Watcher takes a snapshot of important parts of your Windows system: running processes, files, registry, scheduled tasks. Afterwards, it tracks changes - every time you log in, or whenever you run it. When a change is detected, you are notified.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Abdal AES Encryption

    Abdal AES Encryption

    AES Message Encryption Tool

    Abdal AES Encryption is a security tool for encrypting messages developed by the Abdal team. This tool uses AES encryption and has high power. AES stands for Advanced Encryption Standard, which was developed in 2001 by the US National Institute of Technology and Standards. The advanced encryption standard is accepted by the US government and is now used worldwide. This encryption algorithm replaces the Data Encryption Standard (DES) published in 1977.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Abdal 2-Key Triple DES Builder

    Abdal 2-Key Triple DES Builder

    encrypt / decrypt all your texts with Two-Key Triple DES

    If you need more security to send your messages, we introduce the new tool of Abdal security team called Abdal 2-Key Triple DES Builder. This tool can actually encrypt all your texts that are to be sent as a message between you and any person. Two-Key Triple DES is used to encrypt these messages. This algorithm performs 3 cryptographic processes on each block of information to reduce the penetration rate. The Abdal 2-Key Triple DES Builder tool has four modes for encrypting your data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 5

    chandrasekar Rathinam

    SIEM | SOAR | Incident Response | Digital Foensics

    Sharing my document like SIEM | SOAR Use Cases, Incident Response Templates, Breach Runbook, Digital Forensics Tools, Penetration testing sample reports and Infosec Policies templates to help infosec community to build the SOC | MSSP's .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Verigio - Geo Firewall

    Verigio - Geo Firewall

    Blocking and monitoring of network traffic based on geography.

    Geo Firewall performs blocking of network traffic based on geography (geo IP), allows to add custom subnets, allows exceptions on ports for incoming traffic for specific geography, keeps visual and persistent logs, shows statistics, automatically updates geographical database.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7

    chords-malware-analyzer

    Chords is binary file strings extractor, with many formats supported.

    ...Is able to extract strings from files just like strings, but it also supports windows wide string, base64 and hexadecimal strings (with decoding support) and automatic recognition of Indicators of Compromise (IOCs). It has been developed to support the malware analysis process, but is a general purpose tool.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    CyberGod KSGMPRH

    CyberGod KSGMPRH

    Open-Source antivirus for Windows

    This is an effective tool which is capable of detecting thousands and thousands of malware in your PC, including the shortcut virus to nasty ransomware, The database is regularly updated. See the video for how to use this tool. Version: 1.3 MD5: 707D4BE2AA4547A542A7EEFDB7BC4C4D SHA-1: 899B80928DF59C5745B56480DAA6A51E7F65CB18A4 Source code MD5: 38B3A08D62E7ADD2EE30FCA375207499 IMPORTANT: =========== FULL VERSION : https://sourceforge.net/projects/cybergod-ksgmprh/ NOTE: ===== If this tool has helped you consider supporting it please http://bit.ly/supportCyberGodKSGMPRH via paypal http://bit.ly/CyberGodSecurityDonate
    Downloads: 14 This Week
    Last Update:
    See Project
  • 9
    Treater Antivirus

    Treater Antivirus

    Cloud antivirus scanner based on machine detection

    Treater Anti-Virus is a free portable anti-virus on demand scanner which does not require the installation and updates of signatures. The application is able to detect and neutralize threats not found by the main protection program, such as Trojans, Ransomware, Worms, Dialers, Adware, Riskware, Pornware, SMS Blocks, etc. The utility does not require installation and can be launched from removable USB/CD drives as a "resuscitator" tool to unlock the computer. During the development, the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 10
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    ...Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible. Whonix is produced independently of, and carries no guarantee from, The Tor Project. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PGIIXUA

    PGIIXUA

    PGIIXUA allows to generate network traffic right of your Android

    PGIIXUA allows to generate network traffic right of your Android smartphone. THERE ARE NO VIRUSES, THE SYSTEM JUST DETECTS SUCH TOOLS THAT WAY! Malware detected (wanted feature): 'a variant of Android/HackTool.Loicdos.B application': What does it mean? This tool is based on the 'Low Orbit Ion Canon', but more powerful as for the advanced changes that were made on the software. What is Low Orbit Ion Canon? Low Orbit Ion Cannon (LOIC) is an open-source network stress testing and denial-of-service attack application, written in C#. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Simple Software-restriction Policy

    Simple Software-restriction Policy

    Control which folders programs can be run from.

    A software policy makes a powerful addition to Microsoft Windows' malware protection. In particular, it is more effective against ransomware than traditional approaches to security. If you know about the Linux 'execute permission' bit then you'll understand what this is for. The mode of operation is somewhat different in that execute permission is granted to folders and subfolders rather than individual files, but the intention is the same, to stop undesirable or unknown software from launching unless you OK it. ...
    Downloads: 31 This Week
    Last Update:
    See Project
  • 13
    Cuckoo Sandbox

    Cuckoo Sandbox

    Cuckoo Sandbox is for automated analysis of malware

    Cuckoo Sandbox uses components to monitor the behavior of malware in a Sandbox environment; isolated from the rest of the system. It offers automated analysis of any malicious file on Windows, Linux, macOS, and Android.
    Downloads: 57 This Week
    Last Update:
    See Project
  • 14
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Piens
    Piens is a multifunctional batch-based Program. You can do many useful things with it. Its not a malware. Its just get detected because a batch file which was convertet to exe. (CMLINE.exe)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • 17
    Block This

    Block This

    Free DNS based Ad Blocker for Android

    Block This 3.1 is a free and open source ad blocker for Android that works in all apps and browsers! It provides the additional benefits of malware protection, increased browsing speed and reduction of mobile data traffic. Block all in-app and browser advertisements, including video and audio ads, popup ads, banners, tracking cookies. Block This takes care about your security with its antivirus features! We've included a large list of common malware distributors to keep you safe from viruses. ...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 18
    Is your server running slowly? Clamav-sniffer could help - it scans for malware such as phishes and viruses and configures your firewall to block the cracker.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Pcsafer

    Pcsafer

    PC Security software

    PCsafer is an antivirus,antispyware and firewall
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    DisinfectIt

    A free security program

    DisinfectIt! is a freeware security product that is mainly used for repairing or disinfecting computers. It comes bundled with 20 free programs in one easy to navigate menu system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    AirGap

    Locks backup files disallowing malware (cryptolockers) to alter them

    This application is intended to make a better protection for the backup files. Modern cryptolockers can encrypt even remote files. AirGap is a Windows service that keeps specified files locked for writing, thus disallowing malware to alter them. 31/04/2017 - First idea. 7/05/2017 - 1.0 Release. Usage: On the backup storage machine install AirGap as a service from elevated command prompt: sc create "AirGap" binPath= "C:\Program Files\AirGap\AirGap.exe" In [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AirGap\Parameters] key define folders where files you want to lock and include/exclude masks: "Folder0001"="D:\\Backup\\Daily" "Include0001"="*.vbk; *.vbi" "Exclude0001"="*.tmp; *.temp" And finally start AirGap service: sc start AirGap When you need to remove old (or update) backup files - stop AirGap service, remove files and start service again.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Felix Hash Tool

    Felix Hash Tool

    File Integrity Check Program

    File Integrity Check Program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Dont Hijack This

    Dont Hijack This

    DHT is an anti-hacker tool to fix all the damage caused by viruses.

    Dont Hijack This is an anti-hacker tool to fix all the damage caused by malware. It enables the disabled windows components. It completely removes all the bots/viruses/malware infections in 35 seconds. Fixes: registry editing has been disabled by administrator Task Manger has been disabled by your administrator Windows defender is turned off by group policy proxy settings hijack virus (unable to connect proxy server) unable to install antivirus and antivirus killer windows firewall disabled action center or security center disabled. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24
    JChecksum

    JChecksum

    MD5 Checksum Tool

    This tool checks the integrity of files. It is very important if you don’t want your computer to get infected with viruses and malware. Sometimes, hackers and malicious software developers modify the contents of a downloadable zip, which can even result in granting them remote access to your system. While downloading various software, you might have noticed that developers usually provide hash values (MD5) of their files. This tool enables you to verify the file integrity of the downloaded content. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    WinBOLT

    WinBOLT

    Maintenance Automation Utility

    ...With that in mind, my ultimate goal and function of WinBOLT were simple, fool proof secure automation. WinBOLT automates the standard process of annoying Windows Updates, Malware Scans, running CCleaner etc. This tool is simple, effective and powerful. Check out our website! http://WinBOLT.net/ Developed by Christian Vazquez https://Linkedin.com/in/TechnicianOnline
    Downloads: 2 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB