[go: up one dir, main page]

Showing 25 open source projects for "ransomware"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Yeastar: Business Phone System and Unified Communications Icon
    Yeastar: Business Phone System and Unified Communications

    Go beyond just a PBX with all communications integrated as one.

    User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
    Learn More
  • 1

    RansomWare

    This tools implements a RansomWare (cryptolocker, exfiltration, ...).

    This tools implements a RansomWare (cryptolocker, data exfiltration, ransomnote, ...).
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    Vorta Backup Client

    Vorta Backup Client

    Desktop Backup Client for Borg Backup

    Vorta is a backup client for macOS and Linux desktops. It integrates the mighty Borg Backup with your favorite desktop environment to protect your data from disk failure, ransomware and theft.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Sanoid

    Sanoid

    These are policy-driven snapshot management and replication tools

    Sanoid is a policy-driven snapshot management system for ZFS that automates creation, rotation, and health checks of snapshots across datasets. You describe retention in human terms—hourly, daily, monthly, yearly—via simple templates, and Sanoid enforces those rules consistently without manual cron gymnastics. It sets and respects ZFS properties, places holds to protect in-use snapshots, and surfaces health issues so you notice problems before recovery time. Paired with its sibling syncoid,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Live-Forensicator

    Live-Forensicator

    A suite of Tools to aid Incidence Response and Live Forensics

    Live-Forensicator is a toolkit intended for live forensic collection and initial triage on Windows machines. It automates the capture of volatile information—running processes, network connections, loaded drivers, account sessions, and in-memory artifacts—into a consistent artifact set that investigators can analyze offline. The tool tries to be non-invasive while collecting sensitive data quickly and logs the collection steps to preserve chain-of-custody details and to help auditors...
    Downloads: 0 This Week
    Last Update:
    See Project
  • SOCRadar Extended Threat Intelligence Platform Icon
    SOCRadar Extended Threat Intelligence Platform

    Get real-time visibility into vulnerabilities, leaked data, and threat actor activity targeting your organization.

    SOCRadar Extended Threat Intelligence, a natively single platform from its inception that proactively identifies and analyzes cyber threats with contextual and actionable intelligence.
    Start Free Trial
  • 5

    hdom_access

    receive an email when a file is accessed or modified on linux-unix

    receive an email or done a command when a file is accessed or modified or renamed or erased on linux, watch your files access, secure your workstation against viruses and ransomware
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    GobLin GNU/Linux

    GobLin GNU/Linux

    GobLin: The GNU/Linux Operating System for Governments

    “GobLin is The Linux for Governments”. A customized distribution of the GNU/Linux operating system, adapted to the requirements of public administration. It is designed under the Free Software Philosophy, and open to be adapted in order to cover every level of public administration. With the vision of endowing the government offices with advanced management tools and software, we created a distribution of the GNU/Linux Operating System, adapted to the requirements of a modern...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    RogueKiller

    RogueKiller

    The next generation virus killer. Remove unknown malware

    ...Don't let malicious software setup, stop them before they do harmful actions! Protect your important documents against corruption and theft. With the increasing threat of Ransomware, it's very important to keep your documents secured. Don't be the next victim of a thousand dollars ransom, turn RogueKiller anti ransomware protection on!
    Downloads: 74 This Week
    Last Update:
    See Project
  • 8
    Anti_ransomware
    𝗢𝗽𝗲𝗿𝗮𝘁𝗶𝘃𝗲 𝘀𝗶𝘀𝘁𝗲𝗺 / 𝘇𝗲𝗿𝗼𝗱𝗮𝘆 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 _ Contains advanced security within the kernel, denying use of user memory not allowing user identification / This security allows to stop ransomware attacks _ ! Remove memory / wipe user-space and kernel after system shutdown * Browse anonymously without leaving a trace / tor / privoxy > Sign all operating system and boot verification . Integrity Measurement Architecture _ Subsystem is responsible for calculating the hashes of files and programs before they are loaded - / integrates new security, blacklist and secure boot smack , 𝗡𝗲𝘄 𝗩𝗲𝗿𝘀𝗶𝗼𝗻 : Faster loading, app update, full system in sandbox # / Live password : live - Some apparmor profiles / Credits / Alexandre Pujol .
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9

    Compare Backup Drive Hashes

    A spreadsheet to aid in detecting ransomware-corrupted files

    ...For example, the files on an up-to-date data drive may be compared against the files previously found on that data drive, or on a backup drive. Identifying changed files may be useful as a precaution against ransomware. The Support tab (above) links to a blog post discussing uses of the spreadsheet for that purpose. See also https://raywoodcockslatest.wordpress.com/2022/04/10/ransomware-spreadsheet/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Do not waste time with spreadsheets Icon
    Do not waste time with spreadsheets

    Connect to common Project Management tools such as Jira, Smartsheet, Asana, Wrike, Monday.com, and others.

    Acuity PPM provides Senior Leaders and Project Management Teams (PMO's) with lightweight and easy-to-use software to manage the project portfolio. Acuity PPM helps you create and evaluate new project requests through prioritization, financial planning and resource management.
    Learn More
  • 10
    EG ClamNet Antivirus

    EG ClamNet Antivirus

    A simple antivirus that provide a graphical interface for ClamAV

    ...It can be installed on the existing default windows antivirus (Windows Defender) and compatible with it as extra protection. 1) Antivirus & Internet Security: EG ClamNet Antivirus is powered by ClamAV which has fast scanning, detects over 9 millions viruses, malware, worms and trozens. It also protects from MS Office macro viruses, mobile malware, other threats (including known ransomware). 2) Cleaner: EG ClamNet Antivirus has an additional feature of effective cleaning of junk files. With this feature you can optimize your system, increase memory space and system speed by cleaning junk files. Cleaning such junk files improves your system's security and speed-up your system.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 11
    Shennina

    Shennina

    Automating Host Exploitation with AI

    Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, and exploitation using Artificial Intelligence. Shennina is integrated with Metasploit and Nmap for performing the attacks, as well as being integrated with an in-house Command-and-Control Server for exfiltrating data from compromised machines automatically. Shennina scans a set of input targets for available network services, uses its AI engine...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    file-inspector_v2

    file-inspector_v2

    File Backup & Restore case of ransomware infection

    It is a program that backs up document files in the PC and provides functions to restore files such as photos and documents stored in the case of ransomware infection. It is provided for free for anyone to use, and the current test version is uploaded. build 001 is available until December 31, 2024. From build 002, there will be no limit on the expiration date.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Este proyecto esta destinado a detener el ransomware compartiendo seguridad avanzada
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    DBRECOVER for MySQL

    repair corrupt MySQL database recover dropped table and database

    DBRECOVER For MYSQL Database(InnoDB/MyISAM) is professional utility to recover data from damaged or corrupt InnoDB tables and MyISAM tables, made by DBRECOVER SOFTWARE INC. We provide dbrecover for mysql as software and service. Using DBRECOVER For MYSQL , it is possible to recover data from tables that can not be read even using innodb_force_recovery. The software is intended to be used against ibdata files that are not in active use by a live DB server. In general terms, the...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 15
    OraDumpReader

    OraDumpReader

    Oracle export expdp dump file recovery software

    the software directly reads data from oracle exp & expdp result dump file . even the file is corrupted or damaged by malware/ransomware, the software can still scan the whole file , and find the good part of data. IMP-00009 abnormal end of export file IMP-00037 Character set marker unknown ORA-31619: invalid dump file
    Downloads: 12 This Week
    Last Update:
    See Project
  • 16
    CyberGod KSGMPRH

    CyberGod KSGMPRH

    Open-Source antivirus for Windows

    This is an effective tool which is capable of detecting thousands and thousands of malware in your PC, including the shortcut virus to nasty ransomware, The database is regularly updated. See the video for how to use this tool. Version: 1.3 MD5: 707D4BE2AA4547A542A7EEFDB7BC4C4D SHA-1: 899B80928DF59C5745B56480DAA6A51E7F65CB18A4 Source code MD5: 38B3A08D62E7ADD2EE30FCA375207499 IMPORTANT: =========== FULL VERSION : https://sourceforge.net/projects/cybergod-ksgmprh/ NOTE: ===== If this tool has helped you consider supporting it please http://bit.ly/supportCyberGodKSGMPRH via paypal http://bit.ly/CyberGodSecurityDonate
    Leader badge">
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17
    Treater Antivirus

    Treater Antivirus

    Cloud antivirus scanner based on machine detection

    Treater Anti-Virus is a free portable anti-virus on demand scanner which does not require the installation and updates of signatures. The application is able to detect and neutralize threats not found by the main protection program, such as Trojans, Ransomware, Worms, Dialers, Adware, Riskware, Pornware, SMS Blocks, etc. The utility does not require installation and can be launched from removable USB/CD drives as a "resuscitator" tool to unlock the computer. During the development, the interface requirements were taken into account, which has an intuitive structure and light colors in the Metro style. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    Simple Software-restriction Policy

    Simple Software-restriction Policy

    Control which folders programs can be run from.

    A software policy makes a powerful addition to Microsoft Windows' malware protection. In particular, it is more effective against ransomware than traditional approaches to security. If you know about the Linux 'execute permission' bit then you'll understand what this is for. The mode of operation is somewhat different in that execute permission is granted to folders and subfolders rather than individual files, but the intention is the same, to stop undesirable or unknown software from launching unless you OK it. ...
    Downloads: 30 This Week
    Last Update:
    See Project
  • 19

    Ransomware Recovery Tool

    Why pay Ransom when you have Ransomware Recovery Tool for decryption

    ...In recent times, Wannacry Ransomware attack is the most recent one and trust me it created havoc by encrypting lots of valuable data. But with this, Ransomware Recovery tool, now you can recover files infected by Ransomware and other viruses. This recovery tool is one of the best solution to recover & restore corrupt, damaged and inaccessible data with great efficiency.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Malwarebytes
    ...Malwarebytes 3.0 is the next-gen security program that protects you from the most advanced (zero-day) threats, making antivirus obsolete. Malwarebytes 3.0 combines all of our malware-fighting technology - anti-malware, anti-ransomware, anti-exploit, and malicious website protection into one program that scans 4x faster than previous versions of Malwarebytes Anti-Malware Premium. Benefits: Protects you from advanced (zero-day) threats, including ransomware, so you can surf the Web without worry Removes all traces of malware for complete safety Removes potentially unwanted programs (PUPs) that make your computer run poorly Scans fast so you don't have to sit around and wait for your security to finish working Easy to use, just set it and forget it Can replace antivirus or run alongside other antivirus programs.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 21

    LockyMonitorConsole

    Console app to check if files has been changed by crypto ransomware

    Console application to check if files has been changed by crypto ransomware like Locky. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disable the network interfaces of the host. It runs under the user account and monitor drives which are connected to a server share.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    LockyMonitor

    Windows Service to check if files has been changed by ransomware

    Windwos Service to check if files has been changed by crypto ransomware. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disconnect the host or stop the server (LanmanServer) service to disconnect all shares on the server. The FileSystemWatcher object raises the events for the files in the monitored target folder. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    LockyService

    Windows Service to monitor file events for crypto ransomware

    Windows Service to monitor drive c: for file events with crypto specific file extensions or with big file entropy. It does not prevent from ransomware infection! Don't use it in productive environments to prevent data loss! The Software comes without any warranty. When a alarm is triggerd it send a email and shutdown the host or disable the network interfaces. The alarm can be triggerd if locky extensions were found. Or if files were probably encrypted (big file entropy level). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Srihari Humbarwadi
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    DIY-anti-ransomware

    Create an immutable S3 WORM object storage server using MinIO on a RPi

    Create a home/test lab anti-ransomware solution for backup data storage using a: - Raspberry Pi 4 Model B with two 512GB USB 3.0 flash disk drives - Immutable S3 write-once-read-many (WORM) enabled MinIO S3 bucket with erasure code - Virtual air gap service with schedule to disable/enable the network to allow inbound backups
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next