Source code of the Chaos Ransomware, also known as Ryuk and Yashma.
☆18Dec 21, 2024Updated last year
Alternatives and similar repositories for Chaos-Ransomware-Builder
Users that are interested in Chaos-Ransomware-Builder are comparing it to the libraries listed below
Sorting:
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- linux based ransomware builder tool that can create a fully offline windows ransomware executable.☆30Jan 10, 2026Updated 2 months ago
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆26Sep 4, 2025Updated 6 months ago
- Good CLR Host with Native patchless AMSI Bypass☆23May 14, 2025Updated 10 months ago
- Chaos Ransomware builder☆13Aug 10, 2022Updated 3 years ago
- ☆14Jul 1, 2022Updated 3 years ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated 11 months ago
- Common password lists, filtered by complexity and length policy.☆16Sep 22, 2021Updated 4 years ago
- ☆15Aug 12, 2024Updated last year
- ☆11Dec 26, 2022Updated 3 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- Support in Delphi for WebP and Heif image codecs with a wrapper for the DLLs.☆15Mar 6, 2025Updated last year
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆14Jan 7, 2026Updated 2 months ago
- ☆18Jan 2, 2018Updated 8 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- sms bomber in django☆14May 28, 2021Updated 4 years ago
- RatChatPT☆16Jun 9, 2023Updated 2 years ago
- Regain device access if denied/disabled by other programs (esp. device control programs, ransomware)☆12Dec 13, 2019Updated 6 years ago
- Automated script to list products on facebook marketplace using python and selenium.☆33Jul 8, 2022Updated 3 years ago
- XTempmail is a place where you can create or check unlimited temporary emails and they will automatically check the inbox.☆14Dec 9, 2025Updated 3 months ago
- Advanced information gathering & OSINT tool for phone numbers.☆13Oct 9, 2020Updated 5 years ago
- Github repo from YouTube tutorial about customizing Airgeddon's Captive Portal template.☆14Aug 29, 2023Updated 2 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- a raspberry pi zero w based hacking tool that installs a reverse shell on the target pc (running windows) which runs at startup using p4w…☆10Apr 12, 2021Updated 4 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆45Apr 27, 2025Updated 10 months ago
- Go ransomware utilising ChaCha20 and ECIES encryption.☆67Jul 3, 2024Updated last year
- A working VIM setup for maintaining Snort configuration files.☆14Nov 2, 2015Updated 10 years ago
- Network and IP Tools For Attack and Hacking Burtforce☆13Aug 19, 2022Updated 3 years ago
- Unified repository for different Metasploit Framework payloads☆16Apr 3, 2017Updated 8 years ago
- Cyber Equipment for Carrying out Pentesting and Server Defense from Hacker Attack Activities☆19Oct 16, 2025Updated 5 months ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tran☆13May 27, 2023Updated 2 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Mar 30, 2017Updated 8 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- An Android music player based on Apollo.☆25Feb 2, 2014Updated 12 years ago