MicroSCOPE
ransomwhere
MicroSCOPE | ransomwhere | |
---|---|---|
3 | 3 | |
15 | 206 | |
- | - | |
3.8 | 5.1 | |
11 months ago | 7 months ago | |
Go | Go | |
BSD 3-clause "New" or "Revised" License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
MicroSCOPE
ransomwhere
What are some alternatives?
amber - Reflective PE packer.
emp3r0r - Linux/Windows post-exploitation framework made by linux user
Qu1cksc0pe - All-in-One malware analysis tool.
neurax - A framework for constructing self-spreading binaries
pakkero - Pakkero is a binary packer written in Go made for fun and educational purpose. Its main goal is to take in input a program file (elf binary, script, even appimage) and compress it, protect it from tampering and intrusion.
Coldfire - Golang malware development library
pe - A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
GoBot2 - Second Version of The GoBot Botnet, But more advanced.
go - The Go programming language
YaraHunter - 🔍🔍 Malware scanner for cloud-native, as part of CI/CD and at Runtime 🔍🔍
REconfig-linux - Configuration Extractor for the Linux variant of REvil Ransomware