abhir98 / ransomwareLinks
Project Summary This project was developed for the Computer Security course at my academic degree. Basically, it will encrypt your files in background using AES-256-CTR, a strong encryption algorithm, using RSA-4096 to secure the exchange with the server, optionally using the Tor SOCKS5 Proxy. The base functionality is what you see in the famous…
☆85Updated 4 years ago
Alternatives and similar repositories for ransomware
Users that are interested in ransomware are comparing it to the libraries listed below
Sorting:
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆49Updated 3 years ago
- A Simple Go program for Windows that will recover Google Chrome Logins☆78Updated 4 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 2 years ago
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆62Updated 2 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Updated 7 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆66Updated last year
- An interactive mock C2 server☆17Updated 2 years ago
- A Hacking and Pentesting Tool for Windows☆19Updated 3 months ago
- Malware and malicious applications database☆39Updated last year
- [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and …☆229Updated last year
- A fast, lightweight botnet written in pure C.☆40Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 4 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆40Updated last year
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆79Updated last year
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆24Updated 3 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆63Updated 4 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated last year
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆72Updated 9 months ago
- GoRAT (Go Remote Access Tool) is an extremely powerful reverse shell, file server, and control plane using HTTPS reverse tunnels as a tra…☆72Updated 3 years ago
- Well, I have created this shit for educational pruposes (I think)☆37Updated 3 years ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆158Updated 7 months ago
- UNFINISHED Botnet using a Go and Bootstrap Based C2, Support for Windows, Linux and Android Clients.☆100Updated 3 years ago
- Windows Hacking FrameWork using Reverse Shell☆106Updated 7 months ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 6 years ago
- Decentralised P2P botnet using toxcore.☆179Updated 3 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆30Updated 5 years ago
- Easy to understand back door written in python☆36Updated 3 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20Updated 4 years ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆62Updated last month
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago