Hildaboo / BabukRansomware
Reversed source code of the Babuk Ransomware Version 1
☆20Updated 4 years ago
Alternatives and similar repositories for BabukRansomware
Users that are interested in BabukRansomware are comparing it to the libraries listed below
Sorting:
- Reversed source code to the Babuk ransomware builder.☆17Updated 3 years ago
- Conti Ransomware Source Code☆20Updated 3 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Updated 3 years ago
- Decompiled NotPetya File Encryptor Code☆14Updated 2 years ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆15Updated 4 years ago
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆14Updated 8 years ago
- ☆26Updated 4 years ago
- ☆31Updated 4 years ago
- Simple class to search and upload files☆28Updated 5 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Updated 3 years ago
- Screen Locker virus (open source)☆10Updated 4 years ago
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆18Updated 3 years ago
- Handy script to automate the attack☆20Updated 5 years ago
- ☆14Updated 4 years ago
- Hellokitty Ransomware Source Code☆15Updated last year
- Collaborative malware exchange repository.☆33Updated 5 months ago
- A new idea to build an anti ransomware☆23Updated 4 years ago
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆20Updated 2 years ago
- C# Admin Control Panel Finder For Windows☆42Updated 5 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆14Updated 4 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆16Updated 4 years ago
- Multipurpose malware framework☆24Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 3 years ago
- ☆16Updated 3 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago