Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentionally introduced by the leaker to prevent the locker from being built. The Queue header file which implements a few linked list data structures that Conti uses for task scheduling in the Threadpool had several mi…
☆180May 11, 2023Updated 3 years ago
Alternatives and similar repositories for Conti-Ransomware
Users that are interested in Conti-Ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Conti Ransomware Source Code☆20Mar 1, 2022Updated 4 years ago
- Leaked source code of the babuk ransomware by VXUG☆294Sep 11, 2023Updated 2 years ago
- conti locker ransomware source code leak☆31Mar 5, 2022Updated 4 years ago
- C++ stealer (passwords, cookies, forms, cards, wallets)☆12Dec 6, 2022Updated 3 years ago
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Conti Locker source code☆196Mar 2, 2022Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆81Jan 13, 2024Updated 2 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- ☆46Apr 28, 2026Updated 3 weeks ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 5 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,082Aug 17, 2021Updated 4 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆622Mar 16, 2022Updated 4 years ago
- A collection of cpuid instruction implementations for anti-vm purposes.☆10Oct 5, 2023Updated 2 years ago
- This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay f…☆41Sep 29, 2023Updated 2 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- Source code of the Rensenware ransomware in .NET☆19Jul 24, 2021Updated 4 years ago
- ☆69Jul 26, 2021Updated 4 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆104Dec 17, 2025Updated 5 months ago
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆200May 29, 2025Updated 11 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆284Mar 1, 2021Updated 5 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆15Apr 16, 2023Updated 3 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 3 years ago
- An advanced Ransomware written in C++ and fully customizable☆94Sep 30, 2023Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,887Feb 28, 2024Updated 2 years ago
- Paradise Ransomware Source☆13Sep 6, 2021Updated 4 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- a tool to bypass av for red team☆16Apr 21, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Formely KMon, a Windows Kernel Driver designed to prevent malware attacks by monitoring the creation of registry keys in common autorun l…☆21Feb 15, 2014Updated 12 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Aug 16, 2024Updated last year
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆20Jan 3, 2023Updated 3 years ago
- A workshop about Malware Development☆1,780Jun 2, 2023Updated 2 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆47Oct 30, 2022Updated 3 years ago
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆59Sep 27, 2023Updated 2 years ago
- ☆30Jul 21, 2020Updated 5 years ago