For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.
☆455Mar 21, 2026Updated 2 weeks ago
Alternatives and similar repositories for Ransomware-Database
Users that are interested in Ransomware-Database are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.☆3,726Mar 29, 2026Updated last week
- Just another malware database.☆60Sep 14, 2025Updated 6 months ago
- ☆31Feb 28, 2025Updated last year
- Malware Database that I put malware into. NOT RESPONSIBLE FOR DAMAGES!☆47Mar 7, 2026Updated last month
- Tool designed to exfiltrate OneDrive Business OCR Data☆128Jan 27, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Live malware samples and database, daily update.☆36Apr 29, 2025Updated 11 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆690Feb 1, 2026Updated 2 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 10 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆291May 2, 2025Updated 11 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆511Aug 14, 2025Updated 7 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- ☆60Dec 15, 2023Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of malware families and malware samples which use the Rust programming language.☆214Mar 17, 2026Updated 3 weeks ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,067Mar 10, 2026Updated 3 weeks ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,930Mar 22, 2026Updated 2 weeks ago
- Complete list of LPE exploits for Windows (starting from 2023)☆919Mar 13, 2026Updated 3 weeks ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,361Mar 4, 2026Updated last month
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆74Apr 13, 2025Updated 11 months ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- Configuration Extractors for Malware☆125Apr 23, 2025Updated 11 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆510Mar 7, 2026Updated last month
- Execute shellcode files with rundll32☆218Jan 28, 2024Updated 2 years ago
- Dump configuration from STOP Djvu ransomware sample☆12Feb 19, 2020Updated 6 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆515Dec 22, 2025Updated 3 months ago
- ☆127Sep 1, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some Rust program I wrote while learning Malware Development☆161Feb 4, 2025Updated last year
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 6 months ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated last year
- ☆42Feb 18, 2025Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,337Nov 12, 2025Updated 4 months ago
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 3 years ago
- ForsHops☆153Mar 25, 2025Updated last year