USB Ransomware, will encrypt SOME files and steal some, you can change what it steals.
☆35Apr 22, 2024Updated last year
Alternatives and similar repositories for USB-Ransom
Users that are interested in USB-Ransom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple bash script to install and run tor in linux☆12Nov 2, 2023Updated 2 years ago
- This script exploits a vulnerability related to insecure file uploads, specifically targeting web applications that allow users to upload…☆14Feb 28, 2024Updated 2 years ago
- Easily Install Ngrok on Linux☆15Jan 8, 2024Updated 2 years ago
- A repository of dumb but funny malware... made my me and some friends :D☆12Nov 5, 2023Updated 2 years ago
- Make your Android phone a hacking device with this very simple installation menu☆22Jul 1, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- view vulnerable IP cameras☆18Sep 17, 2024Updated last year
- HorrorTrojan 1.0 + source code. No sources for other versions as i lost them by accidentaly deleting them (2.0, 3.0, special edition and …☆12Mar 28, 2022Updated 4 years ago
- Setup a OpenVPN server on your phone and let other devices connect!☆32Mar 7, 2024Updated 2 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- Kitty-Tools is a Kahoot Cheating Client for all devices and interfaces that is EASY TO USE (Usable on; Windows, Linux, Web, Micro Control…☆382Jan 22, 2026Updated 2 months ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Build a Nuxt app into a single HTML file.☆22Mar 11, 2025Updated last year
- Java Ransomware☆129Mar 3, 2025Updated last year
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆39Mar 13, 2026Updated 3 weeks ago
- Turn PuTTY into an SSH login bruteforcing tool.☆25Nov 21, 2020Updated 5 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- (NFC Manager) A Universal Android NFC research and analysis toolkit. Made for Android security researchers and developers. Clone, analyze…☆56Feb 3, 2026Updated 2 months ago
- Ransomware Decryptors☆35Apr 28, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆33Jan 10, 2021Updated 5 years ago
- Modified Version of the MEMZ Trojan for Vinesauce Joel☆17Mar 6, 2023Updated 3 years ago
- Simple Ransomware using Python PyQt5 and Cryptography libraries. You can make the design you want using the design files.☆15Jun 11, 2022Updated 3 years ago
- Vaccinating against WannaCry ransomware: a free tool by Minerva's research team☆24May 15, 2017Updated 8 years ago
- A Linux Cyptomining malware☆38May 5, 2023Updated 2 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Apr 27, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆23Jan 25, 2022Updated 4 years ago
- There are many powerful viruses 💀 that can damage your PC in a matter of seconds. Batch file virus to gain full access to another comput…☆48Mar 7, 2021Updated 5 years ago
- Source code of the Rensenware ransomware in .NET☆20Jul 24, 2021Updated 4 years ago
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆24Jul 12, 2022Updated 3 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Jan 13, 2024Updated 2 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆19Jan 3, 2023Updated 3 years ago