ghostlulzhacks / Ransomware
Ransomeware
☆46Updated 7 years ago
Alternatives and similar repositories for Ransomware:
Users that are interested in Ransomware are comparing it to the libraries listed below
- Python virus that will make your pc paralyzed once it opened :D☆47Updated 3 years ago
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- Community driven computer worm☆62Updated 2 years ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆40Updated 4 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- A Linux Cyptomining malware☆36Updated last year
- HTTP botnet☆61Updated 8 years ago
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆88Updated 5 years ago
- this makes your payloads, trojans, viruses fully undetectable☆7Updated 7 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Codes for malware, viruses and key-logger and other tools☆33Updated 3 years ago
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 4 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 7 years ago
- Mutation Of Vıruses☆51Updated 9 years ago
- Source code of Claw Key logger previously sold on HackForums☆55Updated 2 years ago
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- Key Logger with UI☆40Updated 8 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆29Updated 6 years ago
- javascript botnet browser chrome firefox V2 is a keylogger to capture card number ,expiration date,CVV any web site ,paypal,facebook,e-co…☆74Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- iSpy Keylogger☆42Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Ransomware builder☆87Updated 4 years ago
- Python Remote Access Tool☆24Updated 5 years ago
- ☆12Updated 5 years ago
- Virus Package ( For Educational Purposes )☆33Updated 3 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 2 years ago
- ☆9Updated 2 years ago