bhassani / WannacryDecompiled
☆23Updated last year
Alternatives and similar repositories for WannacryDecompiled:
Users that are interested in WannacryDecompiled are comparing it to the libraries listed below
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 2 years ago
- Conti Ransomware Source Code☆20Updated 2 years ago
- Simple keylogger written in C# which is ready for modifications.☆13Updated 3 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- Decompiled NotPetya File Encryptor Code☆14Updated 2 years ago
- A very weird RAT☆20Updated 2 years ago
- DarkRats Standalone HVNC☆23Updated 2 years ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 5 years ago
- This script make any windows compatible with RDP connection☆18Updated 3 weeks ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 3 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆9Updated 4 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 3 years ago
- TaskMgr Volatile Environment LPE☆13Updated 2 months ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆12Updated 2 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 3 years ago
- Read my blog for more info -☆32Updated 3 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Updated 3 years ago
- ☆15Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- Sources Codes of many MSIL malwares☆23Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 5 years ago
- conti locker ransomware source code leak☆30Updated 2 years ago
- Get/dump chrome and firefox saved passwords.☆19Updated 4 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- A windows kernel-mode rootkit with remote control☆11Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago