Virgula0 / hidden-tear
An open source RansomWare
☆86Updated 5 years ago
Alternatives and similar repositories for hidden-tear:
Users that are interested in hidden-tear are comparing it to the libraries listed below
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆141Updated 5 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆139Updated last year
- Python based Remote Administration Tool(RAT)☆93Updated 4 years ago
- Simple Malware Downloader☆121Updated 5 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 8 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆132Updated 3 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆57Updated 8 years ago
- Dangerous Malwares☆201Updated 8 years ago
- Escalation / Bypass Windows UAC☆107Updated 5 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆58Updated 7 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆133Updated 5 years ago
- ☆58Updated 7 years ago
- Malware USB Spread | Example C#☆174Updated 5 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆73Updated 2 years ago
- Exploitkit☆184Updated 8 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆72Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆51Updated 8 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆49Updated 7 years ago
- Seeing how easy it is to create ransomware.☆46Updated 2 years ago
- Revenge-RAT C# Stub - Fixed☆88Updated 4 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆96Updated 2 years ago
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆89Updated 4 years ago
- Mass malicious script dump/Malware src dump☆56Updated 8 years ago
- Network worms capable of stealing files from and deleting sensitive information from remote system.☆17Updated 8 years ago
- Pythonic ransomware proof of concept.☆217Updated 4 years ago