The LockBit builder files
☆162Feb 3, 2024Updated 2 years ago
Alternatives and similar repositories for LockBit
Users that are interested in LockBit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆109Sep 21, 2022Updated 3 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- LockBit-Black-Builder_ ;this is Lockbit Black Builder☆10Sep 28, 2022Updated 3 years ago
- Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.☆19Sep 21, 2023Updated 2 years ago
- Small collection of Ransomware organized by family.☆281Oct 6, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- Burpsuite Extension for Jsmon☆23Apr 6, 2026Updated last month
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆57Jan 25, 2022Updated 4 years ago
- Chaos Ransomware builder☆13Aug 10, 2022Updated 3 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆116Apr 22, 2026Updated 2 weeks ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆15Jun 10, 2022Updated 3 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Jul 8, 2021Updated 4 years ago
- It's my First GDI Virus with MBR Overwriting... Enjoy :D☆14May 8, 2022Updated 3 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Feb 14, 2025Updated last year
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- Graphical map of known Advanced Persistent Threats☆65Jan 31, 2026Updated 3 months ago
- Collection of my CTF Writeups, mostly Indonesian CTFs☆13Jan 15, 2024Updated 2 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆530Oct 5, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆15May 6, 2023Updated 3 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- conti locker ransomware source code leak☆31Mar 5, 2022Updated 4 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Polymorphic virus and anitvirus software for information security team project.☆20Apr 13, 2019Updated 7 years ago
- ☆32Oct 11, 2023Updated 2 years ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 4 months ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22May 14, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Trojan Rat Builder(310), Ransomware Builder(7), Crypter(72), Miner(9), Worm(8), Botnet(25), Virus Builder(9), Binder(25), Exploit(7), Key…☆176Jun 18, 2023Updated 2 years ago
- CSGO外部换肤器☆12May 5, 2020Updated 6 years ago
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 8 months ago
- Prevent your binary from being analyzed.☆11Jan 3, 2017Updated 9 years ago
- ☆16Sep 19, 2025Updated 7 months ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- ☆28Sep 7, 2025Updated 8 months ago