EthicalRedTeam.com
  • Twitter

Malware Samples

Please do not infect yourselves. If you need to learn how to use a malware lab, visit my tutorial on making a live malware lab!

Wannacry Ransomware Sample 1

Wannacry Ransomware Sample 2

Wannacry Ransomware Sample 3

Petya Ransomware Samples

Petya Ransomware Doc

Golden Eye Ransomware Sample

Patch for Wannacry

Patch for Petya

More to come

Menu

  • Homepage
  • Malware
    • Malware Samples
    • Making a Dionaea Honeypot
    • Making a Live OS Honeypot
    • Deploying the Modern Honeypot Network
    • How to setup a Live Malware lab (Coming soon)
    • Analysing Malware Caught In A Honeypot
    • Coding a botnet
    • Trevor C2 Command and Control
    • Oracle CVE-2018-2628 Honeypot
  • Articles
    • 2017 Hacks and Exploits
    • Python shells,PHP shells and Netcat
    • 450+ RATS!
    • Google Dork, shady syntax to search
    • Botnet information (Coming soon)
    • Shodan Search Commands
  • Exploits
    • Firing Eternalblue CVE-2017-0147 exploit at a VPS
    • DOS on a Cisco 3550 Catalyst Switch CVE-2017-3881
    • Exploiting CVE-2017-8759 on a VPS (Coming soon)
    • Exploiting Apache Struts CVE-2017-5638 from around the world
    • Hacking with Word Document DDE Shells
  • WifiHacking
    • Cracking Windstream and TWC routers
  • Password Cracking
    • Are your passwords on the internet?
    • Cracking Password Hashes (Coming soon)
    • Credential reuse attack and 1.4 Billion clear text passwords
  • Proof of concepts
    • Exploiting Blueborne CVE-2017-0785 Android Memory Dump
    • Spectre CVE-2017-5753 and CVE-2017-5715 POC
  • Intrusion Detection Systems
    • Splunk with Snort
    • Splunk with Suricata (Coming Soon)
  • Threat Hunting
    • Threat hunting with ELK In Progress
    • Threat hunting with Splunk In Progress
  • Sans HHC
    • HHC 2017 Writeup
  • OSCP
    • Prep Guide
    • BOF Bad Char
    • Mingw
  • Red Teaming Tricks
    • Responder
    • Evading Antivirus
    • Kerberoasting
    • C# FTW
  • Disclaimer

Tutorials

Exploiting

Reverse Engineering

Threat Hunting

  • More

Contact

  • red_team611@protonmail.com
  • (000) 000-0000
  • Linux terminal
Hack The Box

© EthicalRedTeam.com All rights reserved.