bhassani / WannacryDecompiled
☆23Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for WannacryDecompiled
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Updated 3 years ago
- Decompiled NotPetya File Encryptor Code☆12Updated 2 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 2 years ago
- Simple keylogger written in C# which is ready for modifications.☆13Updated 3 years ago
- A very weird RAT☆20Updated 2 years ago
- Reversed source code to the Babuk ransomware builder.☆15Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆25Updated 5 years ago
- ☆15Updated 3 years ago
- Persistent & Undetectable Malware Backdoor☆28Updated 6 months ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 2 years ago
- Simple class to search and upload files☆26Updated 5 years ago
- conti locker ransomware source code leak☆31Updated 2 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 3 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆15Updated 2 years ago
- Malware Development☆10Updated 4 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆15Updated 3 years ago
- Conti Ransomware Source Code☆17Updated 2 years ago
- MBR virus☆21Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- using the Recycle Bin to insure persistence☆11Updated 2 years ago
- Well, I have created this shit for educational pruposes (I think)☆34Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago