The LockBit builder files
☆161Feb 3, 2024Updated 2 years ago
Alternatives and similar repositories for LockBit
Users that are interested in LockBit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆108Sep 21, 2022Updated 3 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- linux based ransomware builder tool that can create a fully offline windows ransomware executable.☆31Jan 10, 2026Updated 3 months ago
- RANSOMWARE BUILDER FOR WINDOWS☆10Feb 26, 2024Updated 2 years ago
- LockBit-Black-Builder_ ;this is Lockbit Black Builder☆10Sep 28, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 各国或地区常见弱口令top200☆15Jan 21, 2022Updated 4 years ago
- Small collection of Ransomware organized by family.☆278Oct 6, 2024Updated last year
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- Burpsuite Extension for Jsmon☆23Apr 6, 2026Updated last week
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆56Jan 25, 2022Updated 4 years ago
- Chaos Ransomware builder☆13Aug 10, 2022Updated 3 years ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Jul 8, 2021Updated 4 years ago
- Orchestration Software for Incident Response☆14Updated this week
- Saas AI Generator Soal Seleksi Kompetensi Dasar (SKD) dan Ringkasan Materi☆13Feb 19, 2026Updated last month
- It's my First GDI Virus with MBR Overwriting... Enjoy :D☆14May 8, 2022Updated 3 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Feb 14, 2025Updated last year
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- Graphical map of known Advanced Persistent Threats☆63Jan 31, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Collection of my CTF Writeups, mostly Indonesian CTFs☆13Jan 15, 2024Updated 2 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated 3 weeks ago
- A list of ChatGPT Prompts for Web Application Security, Bug Bounty, and Pentesting☆39May 18, 2023Updated 2 years ago
- TheBhTiNjector is a filebinder that can concatenate two or more files of some extensions that preserves the integrity of the files and gi…☆15Oct 10, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- ☆16May 29, 2024Updated last year
- ☆15May 6, 2023Updated 2 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆25Aug 21, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆27Jul 11, 2022Updated 3 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- conti locker ransomware source code leak☆31Mar 5, 2022Updated 4 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Polymorphic virus and anitvirus software for information security team project.☆20Apr 13, 2019Updated 7 years ago
- ☆32Oct 11, 2023Updated 2 years ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago