A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support
☆24Jul 12, 2022Updated 3 years ago
Alternatives and similar repositories for RedPetyaOpenSSL
Users that are interested in RedPetyaOpenSSL are comparing it to the libraries listed below
Sorting:
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆85Jun 15, 2024Updated last year
- Halter is a GDI malware written in C for educational and entertaining purposes, it also playes ByteBeat audio.☆14Jun 17, 2022Updated 3 years ago
- 僕が三日くらいで作ったトロイの木馬です。☆10Apr 7, 2023Updated 2 years ago
- ☆16Jan 9, 2023Updated 3 years ago
- By far it is my best and biggest GDI malware I've ever created for educational & entertainment purposes.☆26Nov 7, 2024Updated last year
- I made this malware for educational purpouses. It overwrites the bootsector and shows some GDI-Effects and play some Bytebeats☆10Feb 2, 2022Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Yee ennoy☆12Nov 21, 2023Updated 2 years ago
- WHYPETのMonoxideを無害 化したもの☆10May 28, 2022Updated 3 years ago
- ☆13Apr 15, 2022Updated 3 years ago
- It's my First GDI Virus with MBR Overwriting... Enjoy :D☆14May 8, 2022Updated 3 years ago
- Source code of TrojanXD☆14Feb 11, 2022Updated 4 years ago
- ☆12Feb 20, 2026Updated last month
- Windows and MS-DOS malware samples repository.☆18Oct 3, 2021Updated 4 years ago
- ☆14Jul 1, 2022Updated 3 years ago
- ☆17Aug 18, 2022Updated 3 years ago
- GDI malware made by Itzsten, for educational purposes only☆13Jul 20, 2025Updated 8 months ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆61Apr 14, 2022Updated 3 years ago
- Malwares are here☆25Jan 16, 2025Updated last year
- Decompiled NotPetya File Encryptor Code☆18Aug 23, 2022Updated 3 years ago
- A little Trojan I wrote in a few days, creating GDI screen effects.☆70Oct 31, 2021Updated 4 years ago
- c++ and C# gdi effects (noskid)☆22Nov 21, 2023Updated 2 years ago
- ☆11May 27, 2021Updated 4 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- Collection of various types of win32 malware & tools etc.☆26Oct 15, 2022Updated 3 years ago
- $h!tty Skidded malwares I found online (warning - very cringe) Disclaimer: Most of them still dangerous. This repo is for educational pur…☆30Oct 12, 2023Updated 2 years ago
- bot net ufonet con ia☆12Jul 7, 2024Updated last year
- WARNING: This repository full of malicious programs, and this is used for educational purposes! Any actions from any malwares to your com…☆25Jun 28, 2024Updated last year
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- This is my own custom fork of Bhassani's original repo, which contains the (unfinished) reverse-engineered WannaCry Ransomware-related fi…☆10Mar 7, 2023Updated 3 years ago
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- A 64bit hobby operating system written in C++☆56Feb 20, 2026Updated last month
- ☆36Apr 3, 2023Updated 2 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 3 years ago
- ☆10Sep 17, 2023Updated 2 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- PE文件解析和加壳工具☆18Feb 21, 2023Updated 3 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago