Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentionally introduced by the leaker to prevent the locker from being built. The Queue header file which implements a few linked list data structures that Conti uses for task scheduling in the Threadpool had several mi…
☆169May 11, 2023Updated 2 years ago
Alternatives and similar repositories for Conti-Ransomware
Users that are interested in Conti-Ransomware are comparing it to the libraries listed below
Sorting:
- Leaked source code of the babuk ransomware by VXUG☆290Sep 11, 2023Updated 2 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 3 years ago
- C++ stealer (passwords, cookies, forms, cards, wallets)☆12Dec 6, 2022Updated 3 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- conti locker ransomware source code leak☆31Mar 5, 2022Updated 3 years ago
- Conti Locker source code☆197Mar 2, 2022Updated 3 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆79Jan 13, 2024Updated 2 years ago
- ☆46Jan 30, 2024Updated 2 years ago
- A collection of cpuid instruction implementations for anti-vm purposes.☆10Oct 5, 2023Updated 2 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 3 years ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆19Jan 3, 2023Updated 3 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay f…☆39Sep 29, 2023Updated 2 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,075Aug 17, 2021Updated 4 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆104Dec 17, 2025Updated 2 months ago
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 4 months ago
- Anywhere is a powerful botnet that allows for the remote control of compromised devices☆29Jan 19, 2023Updated 3 years ago
- ☆18Jan 9, 2023Updated 3 years ago
- An advanced Ransomware written in C++ and fully customizable☆96Sep 30, 2023Updated 2 years ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆616Mar 16, 2022Updated 3 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Sep 4, 2021Updated 4 years ago
- Simple API Hooks detector☆77Aug 22, 2022Updated 3 years ago
- Cheats, with external menu. Using nullbase & imgui☆14Aug 30, 2022Updated 3 years ago
- Collection of various malicious functionality to aid in malware development☆1,841Feb 28, 2024Updated 2 years ago
- PoC arbitrary WPM without a process handle☆20Jul 22, 2023Updated 2 years ago
- a tool to bypass av for red team☆16Apr 21, 2022Updated 3 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆115Aug 29, 2022Updated 3 years ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆299Apr 10, 2021Updated 4 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆274Mar 1, 2021Updated 4 years ago
- Formely KMon, a Windows Kernel Driver designed to prevent malware attacks by monitoring the creation of registry keys in common autorun l…☆21Feb 15, 2014Updated 12 years ago
- ☆30Jul 21, 2020Updated 5 years ago
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago