fadyosman / WannaCrySample
Sample of the wanna cry ransomware.
☆31Updated 7 years ago
Alternatives and similar repositories for WannaCrySample:
Users that are interested in WannaCrySample are comparing it to the libraries listed below
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆46Updated 2 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Persistent & Undetectable Malware Backdoor☆29Updated 10 months ago
- Mass malicious script dump/Malware src dump☆56Updated 8 years ago
- ⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan☆25Updated 6 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆22Updated 8 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- FUZZBUNCH - NSA security tools☆73Updated 7 years ago
- ClipBanker Spy Trojan☆11Updated 6 months ago
- Malware captured with honeypots☆38Updated 7 years ago
- An advanced Ransomware with CryptoGraphy and all the stuff.☆7Updated 4 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆29Updated 8 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆32Updated 5 years ago
- 👾 WHT allow you to disable Windows Defender, Windows Firewall, clear all logs and reverse (Enable Firewall, enable Defender)☆24Updated 5 years ago
- Collection of android malware samples☆55Updated 7 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Simple RAT in C#☆25Updated 4 years ago
- Resources for our (extended) version of our IMC Crypto-Mining Malware paper☆30Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 8 years ago
- ☆58Updated 7 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 4 years ago
- ☆69Updated 6 years ago
- Mutation Of Vıruses☆50Updated 9 years ago