ChillRansomware is a Ransomware from the Chill Malware bundle
☆13May 22, 2024Updated last year
Alternatives and similar repositories for ChillRansomware
Users that are interested in ChillRansomware are comparing it to the libraries listed below
Sorting:
- Random small pieces of code☆10May 22, 2024Updated last year
- The backend for the rewritten hidden tear ransomware☆10May 22, 2024Updated last year
- A recode of the open source ransomware "Hidden Tear", this has fixes for all of the old hidden tear problems and has a bit cleaner code☆13May 22, 2024Updated last year
- ☆12May 22, 2024Updated last year
- A very weird RAT☆19Aug 11, 2022Updated 3 years ago
- ☆28Feb 7, 2021Updated 5 years ago
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 10 months ago
- Maintaining account persistence via XSS and Oauth☆77Jan 7, 2019Updated 7 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- Well, I have created this shit for educational pruposes (I think)☆38Jul 24, 2022Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- Moto E4 (Qualcomm) Device Tree☆12Oct 8, 2017Updated 8 years ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- ☆12Oct 28, 2022Updated 3 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- A simple application to keep on an eye on the availability of HTTP sites☆15Oct 10, 2023Updated 2 years ago
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Information☆14Apr 22, 2022Updated 3 years ago
- u-blox Linux Kernel repository☆12Jan 29, 2016Updated 10 years ago
- Using this tool you can increase visitors in your blog. Just copy link and paste, enter number of visitors and wait for the process. Not …☆10Aug 18, 2020Updated 5 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- A simple bash virus (without payload) for the second assignment of the "Malware analysis and design" course in Master Degree in Computer …☆13Oct 16, 2017Updated 8 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Experimental linux kernel module to mirror evdev inputs☆16Aug 1, 2020Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- Shellcode loader with evasion capabilities written in Nim☆15Jan 25, 2025Updated last year
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Hyperbox Client☆13Dec 27, 2021Updated 4 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago