For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
☆479Mar 21, 2026Updated last month
Alternatives and similar repositories for Ransomware-Database
Users that are interested in Ransomware-Database are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.☆3,897Apr 27, 2026Updated 3 weeks ago
- ☆12Sep 10, 2025Updated 8 months ago
- Just another malware database.☆60Sep 14, 2025Updated 8 months ago
- ☆31Feb 28, 2025Updated last year
- Malware Database that I put malware into. NOT RESPONSIBLE FOR DAMAGES!☆49Mar 7, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tool designed to exfiltrate OneDrive Business OCR Data☆127Jan 27, 2025Updated last year
- Live malware samples and database, daily update.☆36Apr 29, 2025Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆696Feb 1, 2026Updated 3 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆55May 12, 2025Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆296May 2, 2025Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆519May 11, 2026Updated last week
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆197Feb 6, 2025Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- ☆60Dec 15, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated 2 years ago
- A collection of malware families and malware samples which use the Rust programming language.☆219May 5, 2026Updated 2 weeks ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,077May 11, 2026Updated last week
- AdaptixC2 is a highly modular advanced redteam toolkit☆3,125Mar 22, 2026Updated last month
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆936May 6, 2026Updated last week
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,494May 5, 2026Updated 2 weeks ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- Configuration Extractors for Malware☆126Apr 23, 2025Updated last year
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆512Mar 7, 2026Updated 2 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆80Apr 13, 2025Updated last year
- Execute shellcode files with rundll32☆219Jan 28, 2024Updated 2 years ago
- Dump configuration from STOP Djvu ransomware sample☆12Feb 19, 2020Updated 6 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- ☆127Sep 1, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆530Updated this week
- Some Rust program I wrote while learning Malware Development☆161Feb 4, 2025Updated last year
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆55Sep 13, 2025Updated 8 months ago
- PowerShell implementation for AD CS☆153Mar 2, 2026Updated 2 months ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated 2 years ago
- ☆43Feb 18, 2025Updated last year
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 3 years ago