PaulDotSH / ChillRansomwareView external linksLinks
ChillRansomware is a Ransomware from the Chill Malware bundle
☆13May 22, 2024Updated last year
Alternatives and similar repositories for ChillRansomware
Users that are interested in ChillRansomware are comparing it to the libraries listed below
Sorting:
- Random small pieces of code☆10May 22, 2024Updated last year
- The backend for the rewritten hidden tear ransomware☆10May 22, 2024Updated last year
- A recode of the open source ransomware "Hidden Tear", this has fixes for all of the old hidden tear problems and has a bit cleaner code☆13May 22, 2024Updated last year
- ☆12May 22, 2024Updated last year
- A very weird RAT☆19Aug 11, 2022Updated 3 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- Fun wiz ya telly.... H4xxt00lZ☆28Oct 27, 2024Updated last year
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 9 months ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Moto E4 (Qualcomm) Device Tree☆12Oct 8, 2017Updated 8 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- ☆11Jul 10, 2019Updated 6 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- ☆13Oct 28, 2022Updated 3 years ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- A simple C# password manager that uses SHA256 and AES Encryption.☆10Nov 20, 2020Updated 5 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Post the latest post from your RSS Feed to your LinkedIn Profile☆12Jan 28, 2026Updated 2 weeks ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- Using this tool you can increase visitors in your blog. Just copy link and paste, enter number of visitors and wait for the process. Not …☆10Aug 18, 2020Updated 5 years ago
- Shellcode loader with evasion capabilities written in Nim☆14Jan 25, 2025Updated last year
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- Hyperbox Client☆13Dec 27, 2021Updated 4 years ago
- A Batch to native 16-bit x86 compiler, made in Rust.☆11Apr 17, 2023Updated 2 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Finally, a simple way to put your signature on a PDF for free.☆11Dec 25, 2025Updated last month
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- A simple bash virus (without payload) for the second assignment of the "Malware analysis and design" course in Master Degree in Computer …☆13Oct 16, 2017Updated 8 years ago
- D/Invoke standalone shellcode runners☆39Nov 23, 2023Updated 2 years ago
- Receiving OSC messages via the Autopilot class to fly the AR Parrot drone☆14Feb 2, 2014Updated 12 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago