DanielStott / CryptoLiteLinks
Simple Ransomeware for Windows
☆7Updated 7 years ago
Alternatives and similar repositories for CryptoLite
Users that are interested in CryptoLite are comparing it to the libraries listed below
Sorting:
- ☆14Updated 4 years ago
- Another ransomware made by me for fun.☆6Updated 4 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆15Updated 4 years ago
- ☆31Updated 4 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Screen Locker virus (open source)☆10Updated 4 years ago
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆18Updated 3 years ago
- Simple class to search and upload files☆28Updated 5 years ago
- Ransomeware☆46Updated 7 years ago
- ☆10Updated 7 years ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆9Updated 6 years ago
- Community driven computer worm☆68Updated 2 years ago
- Fud Persistent Windows Backdoor developed purely in python☆30Updated 4 years ago
- malware development kit for x86 windows based platforms with a linux compatible build system☆10Updated 2 years ago
- Command-line Remote Access Tool (RAT)☆13Updated 5 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 4 years ago
- Reversed source code to the Babuk ransomware builder.☆17Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 5 years ago
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆14Updated 4 years ago
- Simple example of how to remove all malwares from disk and registry.☆42Updated 6 years ago
- ☆11Updated 2 years ago
- This virus can destroy your computer :-)☆28Updated 4 years ago
- Download payload to disk and install it to startup then melt.☆37Updated 6 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆45Updated 9 years ago
- Virus RAT v8.0 Beta☆24Updated 8 years ago
- Decompiled NotPetya File Encryptor Code☆14Updated 2 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆36Updated 5 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20Updated 4 years ago
- A Linux Cyptomining malware☆36Updated 2 years ago