rant blog about CryptoTrooper ransomware, its history, legacy and MalwareTech case
☆12Jan 26, 2019Updated 7 years ago
Alternatives and similar repositories for CryptoTrooper
Users that are interested in CryptoTrooper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- Bitdefender's Linux.Encoder.1 Decrypter☆17Nov 17, 2015Updated 10 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆17Dec 6, 2015Updated 10 years ago
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Jni++ : Thread-safe and type-safe C++11 wrap for Android JNI.☆12Jul 25, 2017Updated 8 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- AES Ransomware in batch☆12Jun 25, 2024Updated last year
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Dec 16, 2016Updated 9 years ago
- A open source ransomware.☆11Apr 8, 2017Updated 9 years ago
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆17Nov 4, 2012Updated 13 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- Telegram Bot, Anonymous Message, بات تلگرام☆10May 19, 2018Updated 7 years ago
- Process Hacker 2 hiding from external applications☆19Jun 2, 2015Updated 10 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- ☆22May 25, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Extract the original ransomware binary from an NSIS installer☆18Mar 22, 2017Updated 9 years ago
- Hax That F#uck Html Page☆10Mar 13, 2018Updated 8 years ago
- De Mysteriis Dom jemalloc☆66Nov 1, 2017Updated 8 years ago
- ☆12Jul 17, 2017Updated 8 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- A repository to store Deep Web (onion domain) crawler, scraper, and NLP tools for Tor network.☆22Jul 15, 2016Updated 9 years ago
- Silent file loader☆14Apr 24, 2022Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- Autoit code obfuscation.☆16Sep 14, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆20Mar 1, 2017Updated 9 years ago
- Nj RAT Stub☆14Dec 24, 2016Updated 9 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects i…☆12Dec 27, 2018Updated 7 years ago
- ☆12Aug 27, 2017Updated 8 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago