Source code of the SLocker Android ransomware
☆61Jul 22, 2017Updated 8 years ago
Alternatives and similar repositories for SLocker
Users that are interested in SLocker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- ☆10Jul 24, 2017Updated 8 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 6 years ago
- ☆18Feb 4, 2016Updated 10 years ago
- A fast and advanced ransomware PoC☆60Aug 24, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is a plugin for the c# R.A.T server providing extension to android based phone systems☆20Mar 2, 2018Updated 8 years ago
- Python exploit of cve-2020-7247☆25Feb 19, 2020Updated 6 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆12Jun 18, 2024Updated last year
- HelDroid: Dissect Android Apps Looking for Ransomware Functionalities☆55Nov 4, 2016Updated 9 years ago
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆13Dec 17, 2020Updated 5 years ago
- ☆36Sep 25, 2020Updated 5 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆52Jun 12, 2025Updated 10 months ago
- User Profile Template☆11Mar 21, 2020Updated 6 years ago
- Crypter For Malware and Stealer☆33Apr 10, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Various codes related to Ransomware Developement☆125Jun 10, 2017Updated 8 years ago
- WP-Exploiter is a tool for testing and exploiting a wide range of WordPress websites.☆11Nov 27, 2020Updated 5 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- AccessibilityService Example☆10Nov 4, 2021Updated 4 years ago
- ☆14Feb 28, 2019Updated 7 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- pure python remote adb scanner + nmap scan module☆22Dec 7, 2018Updated 7 years ago
- Archive of leaked Equation Group materials☆15Aug 17, 2016Updated 9 years ago
- This Discord BOT was made in CSharp which uses HTTP Requests to send over data to a webserver which Hosts APIs. This can, Port Scan, Send…☆11Mar 22, 2019Updated 7 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- Simple self destructing note site☆13Aug 15, 2024Updated last year
- A ransomware developed in python, with bypass technics, for educational purposes.☆66Dec 10, 2021Updated 4 years ago
- streamlink-cam4 lets you follow and archive your selected models shows on www.cam4.com☆12Sep 18, 2021Updated 4 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Download payload to disk and install it to startup then melt.☆33Apr 9, 2019Updated 7 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- A browser based bitcoin miner☆16Dec 15, 2013Updated 12 years ago