Virgula0 / hidden-tear
An open source RansomWare
☆86Updated 5 years ago
Alternatives and similar repositories for hidden-tear:
Users that are interested in hidden-tear are comparing it to the libraries listed below
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆142Updated 5 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 5 years ago
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Simple Malware Downloader☆122Updated 5 years ago
- Bind 2 exe's and have them run at the same time.☆46Updated 10 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆59Updated 7 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆139Updated last year
- A ctypes powered python keylogger.☆105Updated 5 years ago
- Malware USB Spread | Example C#☆178Updated 5 years ago
- Pythonic ransomware proof of concept.☆216Updated 4 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆132Updated 3 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem …☆73Updated 2 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 8 years ago
- Escalation / Bypass Windows UAC☆109Updated 5 years ago
- ☆58Updated 7 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆80Updated last year
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Dangerous Malwares☆205Updated 8 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆96Updated 2 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆99Updated 7 years ago
- Backdoor en powershell vía Telegram☆30Updated 7 years ago
- Fileless Ransomware Example☆36Updated 7 years ago
- Phishing webapp generator☆41Updated 6 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago