AHXR / Trojan.Win32.Lockdown
Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager + Locks Computer + Attaches Executable)
☆58Updated 7 years ago
Alternatives and similar repositories for Trojan.Win32.Lockdown:
Users that are interested in Trojan.Win32.Lockdown are comparing it to the libraries listed below
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Updated 7 years ago
- HTTP BOTNET☆8Updated last year
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Batch NetWork Worm with Download & Execute Payload☆12Updated 4 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- using VBS to download and install a powershell malware☆39Updated 5 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆33Updated 5 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 5 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Download and loader .NET payload☆33Updated 5 years ago
- Zero-Day Code Injection and Persistence Technique☆26Updated 7 years ago
- Revenge-RAT C# Stub - Fixed☆86Updated 4 years ago
- Virus RAT v8.0 Beta☆21Updated 7 years ago
- njRAT C# Stub - Fixed For PowerShell☆54Updated 5 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆26Updated 6 years ago
- ☆39Updated 7 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 7 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆42Updated 7 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70Updated 5 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆57Updated 7 years ago
- Nj RAT Stub☆14Updated 8 years ago
- Simple Remote Access Trojan☆21Updated 8 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆63Updated 5 years ago