A simple, fully python ransomware PoC
☆377Jun 23, 2020Updated 5 years ago
Alternatives and similar repositories for CryptSky
Users that are interested in CryptSky are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pythonic ransomware proof of concept.☆219May 12, 2020Updated 5 years ago
- A Linux Ransomware☆768Jan 24, 2025Updated last year
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆144Mar 1, 2021Updated 5 years ago
- Complete Python RansomeWare Source Code With Full Decoumetions.☆226Mar 11, 2023Updated 3 years ago
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆625Mar 5, 2025Updated last year
- Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.☆359Aug 19, 2025Updated 7 months ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB☆959Nov 17, 2018Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Various codes related to Ransomware Developement☆123Jun 10, 2017Updated 8 years ago
- Python Remote Administration Tool (RAT) to gain meterpreter session☆638Oct 29, 2024Updated last year
- Subdomain enumeration tool☆1,362Jul 23, 2025Updated 8 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- A collection of malware samples caught by several honeypots i manage☆1,801Sep 15, 2021Updated 4 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- $2100 .Exe to .Doc Exploit (Python)☆52Dec 19, 2020Updated 5 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,312Jan 31, 2022Updated 4 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆530Oct 5, 2022Updated 3 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆353Apr 20, 2022Updated 3 years ago
- Simple python malware for back connect in windows☆59Apr 24, 2018Updated 7 years ago
- Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop☆111Oct 2, 2018Updated 7 years ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆1,003Jan 19, 2024Updated 2 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Droidefense: Advance Android Malware Analysis Framework☆480Dec 14, 2022Updated 3 years ago
- ☆15Dec 18, 2013Updated 12 years ago
- network reconnaissance toolkit☆436Dec 17, 2018Updated 7 years ago
- An open-source post-exploitation framework for students, researchers and developers.☆9,448Updated this week
- ransomware open-sources☆794Jul 8, 2020Updated 5 years ago
- UAC bypass, Elevate, Persistence methods☆2,737Feb 13, 2023Updated 3 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,454Nov 3, 2018Updated 7 years ago
- Python botnet and backdoor☆1,615Mar 2, 2023Updated 3 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,179Oct 20, 2022Updated 3 years ago
- Java Ransomware☆128Mar 3, 2025Updated last year
- HERCULES is a special payload generator that can bypass antivirus softwares.☆601Jul 18, 2021Updated 4 years ago
- 💸 A smart contract that facilitates the payout of funds (via dividend) to investors.☆11Dec 12, 2017Updated 8 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,417Oct 3, 2020Updated 5 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Apr 3, 2016Updated 9 years ago