Zzutiky666 / LockBitLinks
This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay for such things for nothing.
☆40Updated 2 years ago
Alternatives and similar repositories for LockBit
Users that are interested in LockBit are comparing it to the libraries listed below
Sorting:
- ☆108Updated 3 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆59Updated last month
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆166Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Updated 3 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆89Updated 3 months ago
- 「🛡️」AVs/EDRs Evasion tool☆103Updated last year
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated 2 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆38Updated 3 years ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆82Updated last year
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆179Updated 3 years ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆64Updated last week
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆39Updated 4 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆116Updated this week
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Updated 3 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 8 months ago
- ☆85Updated 3 years ago
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆79Updated last year
- Remcos RAT V3.8.0 Latest version☆33Updated 3 years ago
- An advanced Ransomware written in C++ and fully customizable☆96Updated 2 years ago
- APT38 Tactic PoC for Stealing 0days from security researchers☆323Updated 7 months ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆19Updated 3 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated last year
- Koadic C3 COM Command & Control - JScript RAT☆49Updated 8 years ago
- Open-Source Ransomware Project for learning purpose only written in C# (csharp). Dont use it for bad things.☆87Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆144Updated 3 years ago
- C2 server to connect to a victim machine via reverse shell☆54Updated 3 years ago
- Golang Ransomware☆41Updated 4 years ago