A recode of the open source ransomware "Hidden Tear", this has fixes for all of the old hidden tear problems and has a bit cleaner code
☆13May 22, 2024Updated last year
Alternatives and similar repositories for hidden-tear-recoded
Users that are interested in hidden-tear-recoded are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ChillRansomware is a Ransomware from the Chill Malware bundle☆13May 22, 2024Updated last year
- The backend for the rewritten hidden tear ransomware☆10May 22, 2024Updated last year
- Random small pieces of code☆10May 22, 2024Updated last year
- ☆12May 22, 2024Updated last year
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Open-source windows ransomware created for educational purposes☆22Jan 24, 2021Updated 5 years ago
- Remote Access Trojan for rust lang ( botnet )☆19Oct 18, 2023Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Jul 27, 2022Updated 3 years ago
- Enable Monitor mode & Packet Injection in Raspberry Pi☆26Nov 13, 2021Updated 4 years ago
- Bypassing ETW with Csharp☆27Oct 28, 2021Updated 4 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- Lightweight, persistent, thread-safe, disk-based collections written in C#, including dictionary, list, queue, and stack.☆13Apr 7, 2025Updated 11 months ago
- A simple C# password manager that uses SHA256 and AES Encryption.☆10Nov 20, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Experimental linux kernel module to mirror evdev inputs☆16Aug 1, 2020Updated 5 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Mar 6, 2019Updated 7 years ago
- Listing UDP connections with remote address without sniffing.☆31Sep 26, 2023Updated 2 years ago
- Python source random obfuscation☆11Sep 9, 2022Updated 3 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Nov 17, 2021Updated 4 years ago
- Collection of Vulnerable Websites containing File Upload Vulnerability for practicing skill☆13Jun 6, 2022Updated 3 years ago
- Network hack for ArmA 3 using NFQUEUE☆31Nov 20, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This is a cheat for EFT, it uses windows socket to pass the values read by the driver into server.exe and then into the other computer or…☆14May 1, 2022Updated 3 years ago
- Bypass AMSI☆13Aug 8, 2021Updated 4 years ago
- Sample code to demonstrate how to work with Plugin.Maui.Audio in .NET MAUI☆10Sep 1, 2022Updated 3 years ago
- A platform independent C++ code obfuscator.☆13Jul 20, 2019Updated 6 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆16Jan 19, 2020Updated 6 years ago
- Open repository of binary sample collections for binary analysis.☆16Apr 20, 2021Updated 4 years ago
- Fud Runpe Av Evasion / All Av Bypass☆31Feb 24, 2023Updated 3 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Jan 1, 2023Updated 3 years ago
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- weapon component for esx☆11Apr 1, 2020Updated 5 years ago
- Free and Open Source QR Code Generator☆15Mar 23, 2026Updated last week
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- A .NET library that provides automatic startup for applications at system-boot while providing additional startup management options.☆11Jul 16, 2020Updated 5 years ago
- Metro USB Drives Burn Boot Manager☆14Feb 17, 2020Updated 6 years ago
- Better-xNet - a fork of the original xNet library☆11Jan 8, 2020Updated 6 years ago
- A simple C# class library to help manage running a queue of tasks without relinquishing control.☆13Oct 19, 2025Updated 5 months ago