A fast and advanced ransomware PoC
☆60Aug 24, 2015Updated 10 years ago
Alternatives and similar repositories for DUMB
Users that are interested in DUMB are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- Source code of the Rensenware ransomware in .NET☆19Jul 24, 2021Updated 4 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆31Jul 6, 2017Updated 8 years ago
- PNG Steganography Software☆30Jan 2, 2016Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆144Jun 21, 2023Updated 2 years ago
- Open-Source Ransomware Project for learning purpose only written in C# (csharp). Dont use it for bad things.☆89May 2, 2024Updated 2 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22May 14, 2017Updated 9 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 4 years ago
- Java Ransomware☆129Apr 18, 2026Updated last month
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 5 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Conti Ransomware Source Code☆20Mar 1, 2022Updated 4 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- A malware researching repository.☆20Aug 10, 2021Updated 4 years ago
- ☆10Mar 30, 2016Updated 10 years ago
- Source code of the SLocker Android ransomware☆61Jul 22, 2017Updated 8 years ago
- A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB☆967Nov 17, 2018Updated 7 years ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆35Jan 10, 2021Updated 5 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Demonstrate about file-less malware approach using JavaScript☆51Jun 14, 2017Updated 8 years ago
- Simple C# reverse shell with shellcode and process injection☆40May 13, 2016Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Keep It Secure Private Data Encryption & Decryption Tool☆46Mar 11, 2018Updated 8 years ago
- A proof-of-concept for ransomware encryption☆19Nov 29, 2025Updated 5 months ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- ransomware open-sources☆805Jul 8, 2020Updated 5 years ago
- Pythonic ransomware proof of concept.☆219May 12, 2020Updated 6 years ago
- DarkAgent Remote Administration Tool RAT by DragonHunter☆142Apr 15, 2013Updated 13 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Mar 23, 2018Updated 8 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆58Jul 2, 2017Updated 8 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Jul 8, 2021Updated 4 years ago
- ☆28Feb 7, 2021Updated 5 years ago
- Anywhere is a powerful botnet that allows for the remote control of compromised devices☆30Jan 19, 2023Updated 3 years ago