000JustMe / PewCryptLinks
PewCrypt Ransomware Source
☆59Updated 6 years ago
Alternatives and similar repositories for PewCrypt
Users that are interested in PewCrypt are comparing it to the libraries listed below
Sorting:
- Ransomware base in Java for all operating systems☆19Updated 8 years ago
- Experimental examples of Ransomware in different languages☆37Updated 8 years ago
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆143Updated 7 months ago
- A fast and advanced ransomware PoC☆60Updated 10 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- APT34/OILRIG leak☆11Updated 6 years ago
- Framework for Making Environmental Keyed Payloads☆14Updated 9 years ago
- Free Malware Samples☆17Updated 8 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- A HTTP bot in Java with basic commands and ability's☆10Updated 10 years ago
- Archive of leaked Equation Group materials☆16Updated 9 years ago
- arp-poison (aka arp spoof) tool☆41Updated 12 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- Mass malicious script dump/Malware src dump☆16Updated 9 years ago
- Decrypt Nanocore RAT configuration☆10Updated 8 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- Investigating an Android spyware and phishing application.☆78Updated 7 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 9 years ago
- Python tool to analyze PE file for patterns used by malware☆27Updated 3 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Updated 8 years ago
- ☆58Updated 8 years ago
- Lightweight remote administrative client written in Java.☆73Updated 6 years ago
- Obfuscate your Bash Code 🛡️☆105Updated last year
- Encrypted Memory Classloader loader + Builder☆46Updated 2 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 9 years ago
- Brand New Code Injection for Windows☆13Updated 9 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆61Updated 3 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Updated 3 years ago
- Deobfuscated + reverse engineered javascript malware☆30Updated 7 years ago