Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends encrypted AES keys to files, and other tactics utilized by advanced threat actors like Conti, REvil, WannaCry, Ryuk, Lockbit, etc.
☆26Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python
Users that are interested in PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Utilizing DLang For Offensive Operations.☆15May 29, 2025Updated 11 months ago
- ☆14Mar 28, 2018Updated 8 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.☆19Sep 21, 2023Updated 2 years ago
- Jasmin ransomware web panel path traversal PoC☆21Apr 9, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Conti Ransomware Source Code☆20Mar 1, 2022Updated 4 years ago
- Instagram Auto Exploit Tool && Bypass Two Step Verification☆11May 24, 2024Updated last year
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 3 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆22May 11, 2024Updated 2 years ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Mar 13, 2026Updated 2 months ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆63May 3, 2024Updated 2 years ago
- This is my own custom fork of Bhassani's original repo, which contains the (unfinished) reverse-engineered WannaCry Ransomware-related fi…☆10Mar 7, 2023Updated 3 years ago
- ☆32May 27, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆40May 11, 2026Updated last week
- ☆41Jun 23, 2024Updated last year
- Source code of the Rensenware ransomware in .NET☆19Jul 24, 2021Updated 4 years ago
- This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay f…☆41Sep 29, 2023Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated 2 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆15Apr 16, 2023Updated 3 years ago
- ☆18Mar 22, 2021Updated 5 years ago
- ☆14Oct 12, 2022Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Plugin Driven Remote Administration Tool (Unsupported)☆14Sep 23, 2015Updated 10 years ago
- AES-encrypted TCP/IP swiss army knife.☆11Nov 6, 2022Updated 3 years ago
- 🔱 Ronin the Shogun, WebApp parameter analysis and fuzzer for XSS and SSRF.☆14Sep 8, 2024Updated last year
- ☆10Oct 25, 2017Updated 8 years ago
- 🌐 A curated list of anonymous networks & research papers☆25Apr 1, 2026Updated last month
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Mar 29, 2022Updated 4 years ago
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Jul 19, 2023Updated 2 years ago
- This repo provide rule groups for Little Snitch based on unified host list to block ads, malware, fake news , gambling and porn☆28Updated this week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆20Jan 3, 2023Updated 3 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- A Ransomware Based in AES256 Algorithm☆17Jul 28, 2022Updated 3 years ago
- Radio frequency cybersecurity architech research, based on latest severe damage to privacy or modify wireless devices.☆16Sep 11, 2024Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64