For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
☆467Mar 21, 2026Updated last month
Alternatives and similar repositories for Ransomware-Database
Users that are interested in Ransomware-Database are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.☆3,824Apr 20, 2026Updated last week
- ☆12Sep 10, 2025Updated 7 months ago
- Just another malware database.☆60Sep 14, 2025Updated 7 months ago
- ☆31Feb 28, 2025Updated last year
- Malware Database that I put malware into. NOT RESPONSIBLE FOR DAMAGES!☆49Mar 7, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tool designed to exfiltrate OneDrive Business OCR Data☆127Jan 27, 2025Updated last year
- Live malware samples and database, daily update.☆34Apr 29, 2025Updated 11 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆696Feb 1, 2026Updated 2 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 11 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆293May 2, 2025Updated 11 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆517Aug 14, 2025Updated 8 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆196Feb 6, 2025Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- ☆60Dec 15, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- A collection of malware families and malware samples which use the Rust programming language.☆215Mar 17, 2026Updated last month
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,074Mar 10, 2026Updated last month
- AdaptixC2 is a highly modular advanced redteam toolkit☆3,033Mar 22, 2026Updated last month
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆929Apr 18, 2026Updated last week
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,412Apr 13, 2026Updated 2 weeks ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆74Apr 13, 2025Updated last year
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- Configuration Extractors for Malware☆125Apr 23, 2025Updated last year
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆513Mar 7, 2026Updated last month
- Execute shellcode files with rundll32☆218Jan 28, 2024Updated 2 years ago
- Dump configuration from STOP Djvu ransomware sample☆12Feb 19, 2020Updated 6 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- ☆127Sep 1, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆520Dec 22, 2025Updated 4 months ago
- Some Rust program I wrote while learning Malware Development☆161Feb 4, 2025Updated last year
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 7 months ago
- PowerShell implementation for AD CS☆120Mar 2, 2026Updated last month
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated 2 years ago
- ☆42Feb 18, 2025Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,355Nov 12, 2025Updated 5 months ago