MalwareLeaks / Conti-Ransomware-Source-Full
Conti Ransomware malware leak WITH LOCKER
☆22Updated 3 years ago
Alternatives and similar repositories for Conti-Ransomware-Source-Full:
Users that are interested in Conti-Ransomware-Source-Full are comparing it to the libraries listed below
- Conti Ransomware Source Code☆20Updated 3 years ago
- conti locker ransomware source code leak☆31Updated 3 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆56Updated 6 months ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 3 years ago
- Reversed source code to the Babuk ransomware builder.☆18Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Decompiled NotPetya File Encryptor Code☆13Updated 2 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- A Simple AES Command Line Crypter☆36Updated 2 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- This is a RAT/Backdoor written in C++☆45Updated 4 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆15Updated 4 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- Advanced Keylogger / Info Grabber written in C++.☆30Updated last month
- AutoIt CryptoWire Ransomware Source Code☆7Updated 7 years ago
- PoC of a UEFI Petya ransomware☆42Updated 2 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆102Updated 4 years ago
- Detect virtual environment☆62Updated 6 years ago
- simple user-mode Rootkit☆103Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- Persistent & Undetectable Malware Backdoor☆29Updated 11 months ago
- Injecting shellcode into a process memory and executing it in C#☆56Updated 2 years ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆98Updated 7 months ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Updated 2 years ago
- A runtime Crypter written in C++ to bypass AVs signature based detection☆30Updated 2 years ago
- Malware Development☆11Updated 4 years ago
- Hide malware behind a legit process C#☆118Updated 5 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22Updated 2 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Updated last year