Ruddernation-Designs / WannaCry-DecompiledLinks
WannaCry|WannaDecrypt0r decompiled
☆29Updated 8 years ago
Alternatives and similar repositories for WannaCry-Decompiled
Users that are interested in WannaCry-Decompiled are comparing it to the libraries listed below
Sorting:
- Ransomeware☆46Updated 7 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Community driven computer worm☆67Updated 3 years ago
- Simple example of how to remove all malwares from disk and registry.☆42Updated 6 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- Fud Persistent Windows Backdoor developed purely in python☆30Updated 4 years ago
- Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files☆68Updated 7 years ago
- IRC based botnet developed in C☆45Updated 8 years ago
- Source code of Claw Key logger previously sold on HackForums☆58Updated 3 years ago
- An open-source, centralized HTTPS botnet☆75Updated 2 years ago
- Simple C# Keylogger (Keyboard Layout)☆65Updated 6 years ago
- An open-source, centralized HTTPS botnet☆45Updated 5 years ago
- HTTP botnet☆62Updated 9 years ago
- Helps To Bypass Av Sometimes☆17Updated 4 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆33Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆26Updated 7 years ago
- A New Microsoft Windows Remote Administrator Tool [RAT] with Python by Sir.4m1R.☆111Updated 5 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 2 months ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Python Remote Access Tool☆27Updated 5 years ago
- Persistent & Undetectable Malware Backdoor☆28Updated last year
- some python3 functions to add spreading features to any python backdoor☆54Updated 8 years ago
- Escalation / Bypass Windows UAC☆113Updated 5 years ago
- Download payload to disk and install it to startup then melt.☆36Updated 6 years ago
- ☆59Updated 8 years ago
- The Open Tor Botnet (ZIB)☆33Updated 10 years ago
- Usefull scripts☆81Updated 7 years ago