ejserna / RansomwareLinks
Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.
☆29Updated 7 years ago
Alternatives and similar repositories for Ransomware
Users that are interested in Ransomware are comparing it to the libraries listed below
Sorting:
- This is the ToRat client, a part of the ToRat Project.☆26Updated 6 years ago
- A Simple Go program for Windows that will recover Google Chrome Logins☆80Updated 4 years ago
- Handy script to automate the attack☆22Updated 5 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆78Updated 7 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Updated 6 years ago
- using VBS to download and install a powershell malware☆41Updated 6 years ago
- Simple way to read wirte delete values from registry☆18Updated 6 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆24Updated 4 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- Simple class to search and upload files☆28Updated 6 years ago
- Download payload to disk and install it to startup then melt.☆36Updated 6 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 5 years ago
- ☆23Updated 5 years ago
- DarkCrypter encrypts your files and generates undetectable payloads to evade all anti-virus vendors.☆22Updated 3 years ago
- HTTP botnet☆62Updated 9 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Updated 6 years ago
- Source code of Claw Key logger previously sold on HackForums☆57Updated 3 years ago
- steal password mozilla firefox ,windows,Linux☆11Updated 5 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Updated 8 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆14Updated 5 years ago
- Simple Windows backdoor written in Go☆26Updated 8 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆54Updated 8 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆60Updated 4 years ago
- when i started web application security testing, i fall in love with web shell development and designed some PHP based web shells. This r…☆63Updated 7 years ago
- Modular rootkit framework.☆30Updated 4 years ago