fadyosman / WannaCrySampleLinks
Sample of the wanna cry ransomware.
☆32Updated 8 years ago
Alternatives and similar repositories for WannaCrySample
Users that are interested in WannaCrySample are comparing it to the libraries listed below
Sorting:
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆46Updated 2 years ago
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆97Updated 7 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆145Updated 6 years ago
- WannaCry Ransomware☆142Updated 8 years ago
- ☆59Updated 8 years ago
- FUZZBUNCH - NSA security tools☆78Updated 8 years ago
- Ransomeware☆46Updated 8 years ago
- WannaCry|WannaDecrypt0r decompiled☆29Updated 8 years ago
- Community driven computer worm☆69Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 4 years ago
- An open source RansomWare☆89Updated 5 years ago
- HTTP botnet☆60Updated 9 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆141Updated 2 years ago
- Malicious Software SRC Extract☆32Updated 2 years ago
- Java Ransomware☆129Updated 7 months ago
- Panel for the HTTP botnet UBoat - https://github.com/UBoat-Botnet/UBoat/☆114Updated 4 years ago
- A great remote administrator tool with many features and very stable.☆62Updated 7 years ago
- Dangerous Malwares☆210Updated 8 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆73Updated 4 years ago
- Resources for our (extended) version of our IMC Crypto-Mining Malware paper☆32Updated 5 years ago
- Qbot Botnet. Telnet botnet, most powerfull and strong botnet. requirements: 2 linux server.☆178Updated 9 years ago
- 👾 WHT allow you to disable Windows Defender, Windows Firewall, clear all logs and reverse (Enable Firewall, enable Defender)☆24Updated 6 years ago
- arp-poison (aka arp spoof) tool☆41Updated 12 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- Carbanak leaked source☆74Updated 7 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆78Updated 2 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago