Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends encrypted AES keys to files, and other tactics utilized by advanced threat actors like Conti, REvil, WannaCry, Ryuk, Lockbit, etc.
☆26Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python
Users that are interested in PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Utilizing DLang For Offensive Operations.☆15May 29, 2025Updated 11 months ago
- ☆14Mar 28, 2018Updated 8 years ago
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆23Jul 12, 2022Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.☆19Sep 21, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Jasmin ransomware web panel path traversal PoC☆21Apr 9, 2024Updated 2 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆22May 11, 2024Updated last year
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Mar 13, 2026Updated last month
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆62May 3, 2024Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 9 months ago
- Vaccinating against WannaCry ransomware: a free tool by Minerva's research team☆24May 15, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆24Jan 25, 2022Updated 4 years ago
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆38Updated this week
- C2 frameworks for RTO, server and implants for stealth red-teaming mode.☆13Sep 11, 2024Updated last year
- ☆42Jun 23, 2024Updated last year
- bot net ufonet con ia☆12Jul 7, 2024Updated last year
- Source code of the Rensenware ransomware in .NET☆20Jul 24, 2021Updated 4 years ago
- This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay f…☆40Sep 29, 2023Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated 2 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆14Apr 16, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆14Oct 12, 2022Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Plugin Driven Remote Administration Tool (Unsupported)☆14Sep 23, 2015Updated 10 years ago
- 🔱 Ronin the Shogun, WebApp parameter analysis and fuzzer for XSS and SSRF.☆14Sep 8, 2024Updated last year
- ☆10Oct 25, 2017Updated 8 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Jul 19, 2023Updated 2 years ago
- This repo provide rule groups for Little Snitch based on unified host list to block ads, malware, fake news , gambling and porn☆28Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆20Jan 3, 2023Updated 3 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆23Oct 1, 2025Updated 6 months ago
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- All Type Of Tools written in multipule language .☆22Oct 23, 2022Updated 3 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆31Jul 6, 2017Updated 8 years ago
- All API Endpoints for the Nike Minimalist Fashion App☆15Mar 27, 2017Updated 9 years ago