This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Proxy😎 -- Functionality is based on Cryptolocker😈 ransomware. Be cool😉
☆79Jan 13, 2024Updated 2 years ago
Alternatives and similar repositories for Kenyatta-Ransomware
Users that are interested in Kenyatta-Ransomware are comparing it to the libraries listed below
Sorting:
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆182Mar 23, 2024Updated last year
- Anywhere is a powerful botnet that allows for the remote control of compromised devices☆29Jan 19, 2023Updated 3 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware thre…☆1,152Jan 12, 2024Updated 2 years ago
- PoC Hacking Tool Contains so many stuff like hash cracking, Crypter, Ransomware Builder, etc...☆16Aug 27, 2021Updated 4 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- 🚀An illustration of blockchain/Crypto technology😃 by: Building our own very simple Cryptocurrency (like Bitcoin)/ smart contracts/ Hot …☆10May 10, 2023Updated 2 years ago
- A C# Source Generator for obfuscating string or byte array values using multi-byte xor encryption.☆14Jun 12, 2024Updated last year
- An advanced Ransomware written in C++ and fully customizable☆96Sep 30, 2023Updated 2 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- Reverse Engineering and Debugging Malware☆32Feb 27, 2023Updated 3 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Jun 23, 2022Updated 3 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Ransomware Decryptors☆35Apr 28, 2022Updated 3 years ago
- USB Ransomware, will encrypt SOME files and steal some, you can change what it steals.☆36Apr 22, 2024Updated last year
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Sep 1, 2025Updated 6 months ago
- All Type Of Tools written in multipule language .☆22Oct 23, 2022Updated 3 years ago
- Ro3b - Advance Banking HTTP Botnet☆50Jun 12, 2023Updated 2 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 3 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- File and executable crypter with comprehensible GUI and built-in anti-malicious use☆20Sep 3, 2020Updated 5 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆171May 11, 2023Updated 2 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆133Feb 24, 2026Updated last week
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆23Oct 1, 2025Updated 5 months ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- This tool scans random SSH servers around the world and it tests the most used passwords☆14Dec 26, 2022Updated 3 years ago