000JustMe / PewCryptLinks
PewCrypt Ransomware Source
β59Updated 6 years ago
Alternatives and similar repositories for PewCrypt
Users that are interested in PewCrypt are comparing it to the libraries listed below
Sorting:
- Ransomware base in Java for all operating systemsβ19Updated 8 years ago
- πβπ¨ This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.β141Updated 2 months ago
- A fast and advanced ransomware PoCβ60Updated 10 years ago
- Experimental examples of Ransomware in different languagesβ37Updated 7 years ago
- Free Malware Samplesβ17Updated 7 years ago
- Decrypt Nanocore RAT configurationβ10Updated 8 years ago
- A HTTP bot in Java with basic commands and ability'sβ10Updated 10 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Plβ¦β27Updated 8 years ago
- Application for cracking Red Petya key based on genetic algorithms.β54Updated 3 years ago
- Lightweight remote administrative client written in Java.β73Updated 5 years ago
- Encrypted Memory Classloader loader + Builderβ46Updated 2 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commuβ¦β54Updated 4 years ago
- Full malware Kitβ57Updated 4 years ago
- My public exploit collection.β31Updated 6 years ago
- Automated Cyber Offenseβ92Updated 6 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)β32Updated 5 years ago
- Shellcode / Buffer Overflow π£β20Updated 5 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Managerβ¦β60Updated 7 years ago
- β59Updated 8 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.β27Updated 9 years ago
- The Python Password-Protected Obfuscatorβ34Updated 6 years ago
- Short little AV Test to check Detection Ratesβ22Updated 4 years ago
- Obfuscate your Bash Code π‘οΈβ106Updated 10 months ago
- arp-poison (aka arp spoof) toolβ41Updated 12 years ago
- Simple php backdoor based on extensionβ22Updated 10 years ago
- Mass malicious script dump/Malware src dumpβ16Updated 8 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.β57Updated 3 years ago
- Mass malicious script dump/Malware src dumpβ57Updated 8 years ago
- An ARP Poisoning Defender scriptβ43Updated 7 years ago
- This version touches disk for registry persistence.β26Updated 9 years ago