Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends encrypted AES keys to files, and other tactics utilized by advanced threat actors like Conti, REvil, WannaCry, Ryuk, Lockbit, etc.
☆26Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python
Users that are interested in PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Mar 28, 2018Updated 8 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.☆19Sep 21, 2023Updated 2 years ago
- Jasmin ransomware web panel path traversal PoC☆21Apr 9, 2024Updated 2 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- Instagram Auto Exploit Tool && Bypass Two Step Verification☆10May 24, 2024Updated last year
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆22May 11, 2024Updated last year
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆62May 3, 2024Updated last year
- Vaccinating against WannaCry ransomware: a free tool by Minerva's research team☆24May 15, 2017Updated 8 years ago
- This is my own custom fork of Bhassani's original repo, which contains the (unfinished) reverse-engineered WannaCry Ransomware-related fi…☆10Mar 7, 2023Updated 3 years ago
- This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay f…☆39Sep 29, 2023Updated 2 years ago
- C2 frameworks for RTO, server and implants for stealth red-teaming mode.☆13Sep 11, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆39Updated this week
- bot net ufonet con ia☆12Jul 7, 2024Updated last year
- Source code of the Rensenware ransomware in .NET☆20Jul 24, 2021Updated 4 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73May 22, 2023Updated 2 years ago
- Remote printing by Windows print spooler API forwarding.☆16Aug 3, 2015Updated 10 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated 2 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆14Apr 16, 2023Updated 2 years ago
- ☆18Mar 22, 2021Updated 5 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- AES-encrypted TCP/IP swiss army knife.☆11Nov 6, 2022Updated 3 years ago
- Plugin Driven Remote Administration Tool (Unsupported)☆14Sep 23, 2015Updated 10 years ago
- 🔱 Ronin the Shogun, WebApp parameter analysis and fuzzer for XSS and SSRF.☆14Sep 8, 2024Updated last year
- 🌐 A curated list of anonymous networks & research papers☆20Apr 1, 2026Updated last week
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Mar 29, 2022Updated 4 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Jul 19, 2023Updated 2 years ago
- This repo provide rule groups for Little Snitch based on unified host list to block ads, malware, fake news , gambling and porn☆29Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆19Jan 3, 2023Updated 3 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Radio frequency cybersecurity architech research, based on latest severe damage to privacy or modify wireless devices.☆16Sep 11, 2024Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- All Type Of Tools written in multipule language .☆22Oct 23, 2022Updated 3 years ago