Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager + Locks Computer + Attaches Executable)
☆60Nov 12, 2017Updated 8 years ago
Alternatives and similar repositories for Trojan.Win32.Lockdown
Users that are interested in Trojan.Win32.Lockdown are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Dec 26, 2022Updated 3 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Jul 8, 2021Updated 4 years ago
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆24Jul 12, 2022Updated 3 years ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 7 years ago
- Light C++ Logger Library☆20Nov 24, 2017Updated 8 years ago
- PoC Hacking Tool Contains so many stuff like hash cracking, Crypter, Ransomware Builder, etc...☆16Aug 27, 2021Updated 4 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Jun 14, 2017Updated 8 years ago
- Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files☆66Feb 11, 2018Updated 8 years ago
- Simple way to read wirte delete values from registry☆18Jun 24, 2019Updated 6 years ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,035Jun 3, 2021Updated 4 years ago
- ☆39May 31, 2017Updated 8 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆31Dec 17, 2018Updated 7 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- GDI malware☆10Jul 13, 2021Updated 4 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆20Sep 12, 2019Updated 6 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- JS Jscript - download file from url then run it☆60Mar 11, 2020Updated 6 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Jun 26, 2015Updated 10 years ago
- Sources Codes of many MSIL malwares☆24Aug 29, 2022Updated 3 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- This virus can destroy your computer :-)☆29Nov 15, 2020Updated 5 years ago
- Public open-source code of malware NetTraveler (aka TravNet).☆37May 28, 2015Updated 10 years ago
- Virus RAT v8.0 Beta☆28Mar 4, 2017Updated 9 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- AES Crypter for Society of Engineers Remote Access Trojan (RAT) Project Lead: Derek Ta Security Programmer: Taegan Warren☆16Nov 29, 2014Updated 11 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- ☆16May 6, 2015Updated 10 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- RAT - HTTP based. Undetectable!☆52Dec 13, 2019Updated 6 years ago
- A collection of malware samples.☆39Dec 5, 2017Updated 8 years ago
- Demos of various (also non standard) persistence methods used by malware☆224Mar 5, 2023Updated 3 years ago
- Open-Source Ransomware As A Service for Linux, MacOS and Windows☆15Dec 20, 2020Updated 5 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago