Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentionally introduced by the leaker to prevent the locker from being built. The Queue header file which implements a few linked list data structures that Conti uses for task scheduling in the Threadpool had several mi…
☆179May 11, 2023Updated 2 years ago
Alternatives and similar repositories for Conti-Ransomware
Users that are interested in Conti-Ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- Leaked source code of the babuk ransomware by VXUG☆293Sep 11, 2023Updated 2 years ago
- conti locker ransomware source code leak☆31Mar 5, 2022Updated 4 years ago
- C++ stealer (passwords, cookies, forms, cards, wallets)☆12Dec 6, 2022Updated 3 years ago
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Conti Locker source code☆196Mar 2, 2022Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Jan 13, 2024Updated 2 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- ☆46Jan 30, 2024Updated 2 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,079Aug 17, 2021Updated 4 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆621Mar 16, 2022Updated 4 years ago
- A collection of cpuid instruction implementations for anti-vm purposes.☆10Oct 5, 2023Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay f…☆40Sep 29, 2023Updated 2 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- Source code of the Rensenware ransomware in .NET☆20Jul 24, 2021Updated 4 years ago
- ☆69Jul 26, 2021Updated 4 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆104Dec 17, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆200May 29, 2025Updated 11 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆281Mar 1, 2021Updated 5 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆14Apr 16, 2023Updated 3 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- An advanced Ransomware written in C++ and fully customizable☆95Sep 30, 2023Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,879Feb 28, 2024Updated 2 years ago
- Paradise Ransomware Source☆13Sep 6, 2021Updated 4 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- a tool to bypass av for red team☆16Apr 21, 2022Updated 4 years ago
- Formely KMon, a Windows Kernel Driver designed to prevent malware attacks by monitoring the creation of registry keys in common autorun l…☆21Feb 15, 2014Updated 12 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆20Jan 3, 2023Updated 3 years ago
- A workshop about Malware Development☆1,778Jun 2, 2023Updated 2 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆47Oct 30, 2022Updated 3 years ago
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆59Sep 27, 2023Updated 2 years ago