Monkey-D-Groot / RansomwareLinks
A simple ransomware for my school's project
☆8Updated 7 years ago
Alternatives and similar repositories for Ransomware
Users that are interested in Ransomware are comparing it to the libraries listed below
Sorting:
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- A HTTP bot in Java with basic commands and ability's☆10Updated 9 years ago
- Ransomware Traces Scanner: a file system scanner to find ransomware's manifest files or crypted files☆4Updated last year
- A fast and advanced ransomware PoC☆60Updated 9 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 8 years ago
- malwares src dump☆42Updated 8 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- Remote Windows shell☆32Updated 11 years ago
- Simple Remote Access Trojan☆23Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆51Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆54Updated 8 years ago
- Better Remote Access Trojan☆50Updated 8 years ago
- This is a cross-platform Python 2.x Remote Access Trojan (RAT)☆16Updated 8 years ago
- HTTP BOTNET☆8Updated 2 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- Malicious Software SRC Extract☆74Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 10 years ago
- Vaccinating against WannaCry ransomware: a free tool by Minerva's research team☆24Updated 8 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆89Updated 9 years ago
- Ransomeware☆46Updated 7 years ago
- Zero-Day Code Injection and Persistence Technique☆28Updated 8 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- This is a advanced ransomware example made in AutoIt☆34Updated 9 years ago
- Mirai Botnet DB Project☆26Updated 6 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Updated 8 years ago
- Malware Dump☆20Updated 8 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago