A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support
☆23Jul 12, 2022Updated 3 years ago
Alternatives and similar repositories for RedPetyaOpenSSL
Users that are interested in RedPetyaOpenSSL are comparing it to the libraries listed below
Sorting:
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆85Jun 15, 2024Updated last year
- Small malware made by me for educational & entertainment purposes. It modifies some registry keys, make copies of it self, overwrites the…☆15Jan 10, 2024Updated 2 years ago
- Halter is a GDI malware written in C for educational and entertaining purposes, it also playes ByteBeat audio.☆14Jun 17, 2022Updated 3 years ago
- ☆15Jan 9, 2023Updated 3 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- I made this malware for educational purpouses. It overwrites the bootsector and shows some GDI-Effects and play some Bytebeats☆10Feb 2, 2022Updated 4 years ago
- By far it is my best and biggest GDI malware I've ever created for educational & entertainment purposes.☆26Nov 7, 2024Updated last year
- Yee ennoy☆12Nov 21, 2023Updated 2 years ago
- WHYPETのMonoxideを無害化したもの☆10May 28, 2022Updated 3 years ago
- ☆13Apr 15, 2022Updated 3 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Nov 12, 2017Updated 8 years ago
- Source code of TrojanXD☆14Feb 11, 2022Updated 4 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆61Apr 14, 2022Updated 3 years ago
- It's my First GDI Virus with MBR Overwriting... Enjoy :D☆14May 8, 2022Updated 3 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- ☆14Jul 1, 2022Updated 3 years ago
- GDI malware made by Itzsten, for educational purposes only☆13Jul 20, 2025Updated 7 months ago
- Windows and MS-DOS malware samples repository.☆18Oct 3, 2021Updated 4 years ago
- Decompiled NotPetya File Encryptor Code☆18Aug 23, 2022Updated 3 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- PE文件解析和加壳工具☆18Feb 21, 2023Updated 3 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- Multipurpose malware framework☆28Dec 6, 2021Updated 4 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 3 years ago
- Presentation slides, blogs, and videos of my conference presentations.☆26Jan 31, 2024Updated 2 years ago
- c++ and C# gdi effects (noskid)☆22Nov 21, 2023Updated 2 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆18Apr 12, 2022Updated 3 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Jun 14, 2017Updated 8 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Collection of various types of win32 malware & tools etc.☆26Oct 15, 2022Updated 3 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 3 years ago
- Curated list of ransomware-related resources; awesome style.☆32Jan 17, 2025Updated last year
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 10 months ago
- The open-source DAM for modern organizations☆13Feb 20, 2026Updated last week