Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ransomware. Perfect for learning and awareness, our user-friendly interface guides you through each step, from customizing ransom notes to encrypting files, all with just a few clicks.
☆18Aug 4, 2024Updated last year
Alternatives and similar repositories for PyQt5-RansomwareBuilder
Users that are interested in PyQt5-RansomwareBuilder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Dec 26, 2022Updated 3 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 9 months ago
- A list of ChatGPT Prompts for Web Application Security, Bug Bounty, and Pentesting☆41May 18, 2023Updated 2 years ago
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆117Mar 24, 2026Updated last month
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- linux based ransomware builder tool that can create a fully offline windows ransomware executable.☆32Jan 10, 2026Updated 3 months ago
- ☆18Jan 2, 2018Updated 8 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- Github repo from YouTube tutorial about customizing Airgeddon's Captive Portal template.☆14Aug 29, 2023Updated 2 years ago
- a raspberry pi zero w based hacking tool that installs a reverse shell on the target pc (running windows) which runs at startup using p4w…☆10Apr 12, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Event Tracing for Windows EDR bypass in Rust (usermode)☆40Jun 9, 2024Updated last year
- Network and IP Tools For Attack and Hacking Burtforce☆13Aug 19, 2022Updated 3 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated 2 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Mar 30, 2017Updated 9 years ago
- Sample Rust Hooking Engine☆34Apr 5, 2024Updated 2 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 4 months ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- ☆24Mar 29, 2026Updated last month
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆11Dec 17, 2023Updated 2 years ago
- RANSOMWARE BUILDER FOR WINDOWS☆10Feb 26, 2024Updated 2 years ago
- NeuralinkLLM is an open-source project dedicated to creating a robust interface for interacting and connecting your Brain via NeuralinkGP…☆12Sep 28, 2024Updated last year
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Kernel module to hide tcp connections from an attacker ip address☆11Mar 24, 2022Updated 4 years ago
- In the spirit of #opendata, we publish our list (dangerous.domains) and a full change history here on GitHub, delayed by 6 hours. For liv…☆14Apr 19, 2025Updated last year
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- A BOF to create a scheduled task using a COM object.☆16Dec 3, 2024Updated last year
- The online version of Ciphey☆18Oct 11, 2023Updated 2 years ago
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Nov 14, 2022Updated 3 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- ☆14Oct 1, 2021Updated 4 years ago
- ☆15Dec 3, 2022Updated 3 years ago