D4stiny / jWARELinks
Ransomware base in Java for all operating systems
☆19Updated 8 years ago
Alternatives and similar repositories for jWARE
Users that are interested in jWARE are comparing it to the libraries listed below
Sorting:
- Mass malicious script dump/Malware src dump☆16Updated 9 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆81Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆29Updated 11 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- C & Shellcode Playground..☆10Updated 8 years ago
- 🔵 ethereum grid trading bot☆35Updated 2 months ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 5 years ago
- ☆28Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- Various Crypter Project☆54Updated 11 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆46Updated 7 years ago
- Random stuff☆16Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆21Updated 7 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated 2 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Updated 6 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 10 years ago
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Encrypted Memory Classloader loader + Builder☆46Updated 2 years ago
- Various Crypter Project☆10Updated 11 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 5 years ago