Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentionally introduced by the leaker to prevent the locker from being built. The Queue header file which implements a few linked list data structures that Conti uses for task scheduling in the Threadpool had several mi…
☆173May 11, 2023Updated 2 years ago
Alternatives and similar repositories for Conti-Ransomware
Users that are interested in Conti-Ransomware are comparing it to the libraries listed below
Sorting:
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- Leaked source code of the babuk ransomware by VXUG☆290Sep 11, 2023Updated 2 years ago
- conti locker ransomware source code leak☆31Mar 5, 2022Updated 4 years ago
- C++ stealer (passwords, cookies, forms, cards, wallets)☆12Dec 6, 2022Updated 3 years ago
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 4 years ago
- Conti Locker source code☆196Mar 2, 2022Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Jan 13, 2024Updated 2 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- ☆46Jan 30, 2024Updated 2 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,075Aug 17, 2021Updated 4 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆617Mar 16, 2022Updated 4 years ago
- This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay f…☆39Sep 29, 2023Updated 2 years ago
- A collection of cpuid instruction implementations for anti-vm purposes.☆10Oct 5, 2023Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- ☆69Jul 26, 2021Updated 4 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆105Dec 17, 2025Updated 3 months ago
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆276Mar 1, 2021Updated 5 years ago
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆199May 29, 2025Updated 9 months ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- An advanced Ransomware written in C++ and fully customizable☆96Sep 30, 2023Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,854Feb 28, 2024Updated 2 years ago
- Paradise Ransomware Source☆13Sep 6, 2021Updated 4 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- a tool to bypass av for red team☆16Apr 21, 2022Updated 3 years ago
- Formely KMon, a Windows Kernel Driver designed to prevent malware attacks by monitoring the creation of registry keys in common autorun l…☆21Feb 15, 2014Updated 12 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆19Jan 3, 2023Updated 3 years ago
- A workshop about Malware Development☆1,771Jun 2, 2023Updated 2 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆47Oct 30, 2022Updated 3 years ago
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆60Sep 27, 2023Updated 2 years ago