This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Proxy😎 -- Functionality is based on Cryptolocker😈 ransomware. Be cool😉
☆80Jan 13, 2024Updated 2 years ago
Alternatives and similar repositories for Kenyatta-Ransomware
Users that are interested in Kenyatta-Ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆181Mar 23, 2024Updated 2 years ago
- Anywhere is a powerful botnet that allows for the remote control of compromised devices☆29Jan 19, 2023Updated 3 years ago
- PoC Hacking Tool Contains so many stuff like hash cracking, Crypter, Ransomware Builder, etc...☆16Aug 27, 2021Updated 4 years ago
- 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware thre…☆1,154Jan 12, 2024Updated 2 years ago
- Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42),…☆21Mar 29, 2022Updated 3 years ago
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 4 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆174May 11, 2023Updated 2 years ago
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆60Sep 27, 2023Updated 2 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- This tool scans random SSH servers around the world and it tests the most used passwords☆14Dec 26, 2022Updated 3 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆60Jun 2, 2023Updated 2 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Jun 23, 2022Updated 3 years ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Mar 13, 2026Updated last week
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- A C# Source Generator for obfuscating string or byte array values using multi-byte xor encryption.☆14Jun 12, 2024Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆131Feb 24, 2026Updated 3 weeks ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Jun 5, 2022Updated 3 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- Unpacker for Agile.NET☆13Mar 12, 2023Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- ☆36Feb 1, 2026Updated last month
- File and executable crypter with comprehensible GUI and built-in anti-malicious use☆20Sep 3, 2020Updated 5 years ago
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆20Apr 14, 2022Updated 3 years ago
- ☆19May 24, 2022Updated 3 years ago
- TerminalChat is a console based instant messaging application made for hackers written in python3 & php. Gives all Basic Messaging Functi…☆11Jan 10, 2021Updated 5 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- Reverse Engineering and Debugging Malware☆31Feb 27, 2023Updated 3 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Feb 22, 2026Updated last month