A simple, fully python ransomware PoC
☆377Jun 23, 2020Updated 5 years ago
Alternatives and similar repositories for CryptSky
Users that are interested in CryptSky are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pythonic ransomware proof of concept.☆219May 12, 2020Updated 5 years ago
- A Linux Ransomware☆771Jan 24, 2025Updated last year
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆145Mar 1, 2021Updated 5 years ago
- Complete Python RansomeWare Source Code With Full Decoumetions.☆225Mar 11, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆626Mar 5, 2025Updated last year
- Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.☆360Mar 31, 2026Updated 2 weeks ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB☆960Nov 17, 2018Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Various codes related to Ransomware Developement☆125Jun 10, 2017Updated 8 years ago
- Python Remote Administration Tool (RAT) to gain meterpreter session☆636Oct 29, 2024Updated last year
- Subdomain enumeration tool☆1,362Jul 23, 2025Updated 8 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆947May 8, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of malware samples caught by several honeypots i manage☆1,804Sep 15, 2021Updated 4 years ago
- Python / C# Unmanaged PowerShell based RAT☆774Mar 29, 2023Updated 3 years ago
- $2100 .Exe to .Doc Exploit (Python)☆51Dec 19, 2020Updated 5 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,315Jan 31, 2022Updated 4 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆531Oct 5, 2022Updated 3 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆352Apr 20, 2022Updated 3 years ago
- Simple python malware for back connect in windows☆59Apr 24, 2018Updated 7 years ago
- Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop☆111Oct 2, 2018Updated 7 years ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆1,001Jan 19, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Droidefense: Advance Android Malware Analysis Framework☆483Dec 14, 2022Updated 3 years ago
- ☆15Dec 18, 2013Updated 12 years ago
- network reconnaissance toolkit☆436Dec 17, 2018Updated 7 years ago
- An open-source post-exploitation framework for students, researchers and developers.☆9,456Apr 2, 2026Updated last week
- ransomware open-sources☆796Jul 8, 2020Updated 5 years ago
- UAC bypass, Elevate, Persistence methods☆2,740Feb 13, 2023Updated 3 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,458Nov 3, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Python botnet and backdoor☆1,618Mar 2, 2023Updated 3 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,182Oct 20, 2022Updated 3 years ago
- Java Ransomware☆129Mar 3, 2025Updated last year
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Jul 18, 2021Updated 4 years ago
- 💸 A smart contract that facilitates the payout of funds (via dividend) to investors.☆11Dec 12, 2017Updated 8 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,418Oct 3, 2020Updated 5 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Apr 3, 2016Updated 10 years ago