Ransomware base in Java for all operating systems
☆19Jun 13, 2017Updated 8 years ago
Alternatives and similar repositories for jWARE
Users that are interested in jWARE are comparing it to the libraries listed below
Sorting:
- Ransomware written in vb.net for eduational purpouses☆13Aug 19, 2016Updated 9 years ago
- Python based memory cheat for the game Counter-Strike: Global Offensive.☆19Apr 14, 2017Updated 8 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- A plugin designed for bukkit servers, aiming to reduce the lag that both the server and players experience.☆24Dec 24, 2019Updated 6 years ago
- Makes drivers less sucky to manage from usermode.☆11Aug 5, 2016Updated 9 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- A open source ransomware.☆11Apr 8, 2017Updated 8 years ago
- Simple command line version of Sysinternals WinObj. Currently just lists object names and types given an object manager directory.☆22Sep 4, 2023Updated 2 years ago
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- Simple component as Android SnackBar for Swing Applications☆12Apr 14, 2021Updated 4 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Jan 23, 2017Updated 9 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- Telegram Bot, Anonymous Message, بات تلگرام☆10May 19, 2018Updated 7 years ago
- Patch java archives obfuscated and signed by stringer 3.x - 9.0 (https://jfxstore.com/stringer)☆36May 10, 2020Updated 5 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- A free open-source minecraft 1.9 hacked client☆18Apr 22, 2016Updated 9 years ago
- A simple mail server written in Java☆13Jun 4, 2023Updated 2 years ago
- An editor for hierarchical properties as Java Swing component☆14Nov 13, 2021Updated 4 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Map based captcha plugin for your Minecraft server.☆11Jul 19, 2023Updated 2 years ago
- Extract the original ransomware binary from an NSIS installer☆18Mar 22, 2017Updated 9 years ago
- Hax That F#uck Html Page☆10Mar 13, 2018Updated 8 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- Powerful and robust packet event driven network framework built on top of netty and nio that offers rapid custom binary protocol developm…☆10Apr 4, 2023Updated 2 years ago
- Simple anti-tamper embedded into a simple string encryption.☆10Mar 7, 2019Updated 7 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- SideEffect Keylogger☆14Dec 30, 2016Updated 9 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- A fun tool that attempts to find product keys for commercial softwares☆18Jun 18, 2017Updated 8 years ago
- Autoit code obfuscation.☆16Sep 14, 2016Updated 9 years ago
- The Luhn algorithm is a simple checksum formula used to validate a variety of identification numbers, such as credit card numbers, IMEI n…☆10Dec 4, 2017Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago
- Release of Boxel Files☆14Aug 15, 2021Updated 4 years ago
- ☆16Oct 12, 2017Updated 8 years ago