ejserna / Ransomware
Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.
☆29Updated 7 years ago
Alternatives and similar repositories for Ransomware:
Users that are interested in Ransomware are comparing it to the libraries listed below
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Handy script to automate the attack☆20Updated 5 years ago
- Command line Remote Access tool (RAT) targeting Windows Systems.☆14Updated 5 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 5 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆36Updated 5 years ago
- using VBS to download and install a powershell malware☆41Updated 5 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆56Updated 3 years ago
- Download payload to disk and install it to startup then melt.☆36Updated 6 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Updated 6 years ago
- An advanced Ransomware with CryptoGraphy and all the stuff.☆7Updated 4 years ago
- A Simple Go program for Windows that will recover Google Chrome Logins☆75Updated 4 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 6 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- Modular rootkit framework.☆27Updated 4 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 5 years ago
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- njRAT C# Stub - Fixed For PowerShell☆54Updated 5 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Updated 5 years ago
- Download and loader .NET payload☆36Updated 5 years ago
- Passwordless RDP Session Hijacking☆66Updated 3 years ago
- Some stealers in one. Simple to use.☆6Updated 4 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆96Updated 2 years ago
- Download a .NET payload and run it on memory☆69Updated 6 years ago
- ☆42Updated 7 years ago
- Golang ransomware☆45Updated 4 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 4 years ago
- Simple golang reverse shell☆21Updated 5 years ago