000JustMe / PewCryptLinks
PewCrypt Ransomware Source
☆59Updated 6 years ago
Alternatives and similar repositories for PewCrypt
Users that are interested in PewCrypt are comparing it to the libraries listed below
Sorting:
- Ransomware base in Java for all operating systems☆19Updated 8 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- A fast and advanced ransomware PoC☆60Updated 9 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Free Malware Samples☆17Updated 7 years ago
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆140Updated 3 weeks ago
- APT34/OILRIG leak☆12Updated 6 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆32Updated 5 years ago
- Mass malicious script dump/Malware src dump☆16Updated 8 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Updated 10 years ago
- Express security essentials deployment for Linux Servers☆59Updated 4 years ago
- A tool to find/download malware samples from various public repositories☆12Updated 3 years ago
- Malware captured with honeypots☆38Updated 7 years ago
- Phoenix based exploit kit for educational purpose.☆17Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- My public exploit collection.☆31Updated 6 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Updated 8 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆54Updated 3 years ago
- Mass malicious script dump/Malware src dump☆57Updated 8 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- Archive of leaked Equation Group materials☆15Updated 8 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago