Ransomeware
☆48Sep 25, 2017Updated 8 years ago
Alternatives and similar repositories for Ransomware
Users that are interested in Ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple C++ ransomware, prove the concept.☆27Mar 8, 2017Updated 9 years ago
- ☆12Jul 17, 2017Updated 8 years ago
- Complete Python RansomeWare Source Code With Full Decoumetions.☆226Mar 11, 2023Updated 3 years ago
- HTTP botnet☆63Jul 30, 2016Updated 9 years ago
- ☆39May 31, 2017Updated 8 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆18Feb 10, 2017Updated 9 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆20Sep 12, 2019Updated 6 years ago
- ☆35Sep 25, 2020Updated 5 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- AES Crypter for Society of Engineers Remote Access Trojan (RAT) Project Lead: Derek Ta Security Programmer: Taegan Warren☆16Nov 29, 2014Updated 11 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Nov 12, 2017Updated 8 years ago
- A simple virus(Trojan) aka client-server application written in C/C++/C# for Windows.☆32Nov 10, 2018Updated 7 years ago
- Pe-protector protects executable files.☆52Jul 26, 2021Updated 4 years ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆33Jan 10, 2021Updated 5 years ago
- This is a plugin for the c# R.A.T server providing extension to android based phone systems☆20Mar 2, 2018Updated 8 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆21Jan 16, 2019Updated 7 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- An unfinished project. HTTP botnet coded in VB.net and PHP.☆16Aug 17, 2015Updated 10 years ago
- script to brute force ssh or ftp passwords☆12Jul 22, 2016Updated 9 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- upx变种☆15Aug 2, 2017Updated 8 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆44Sep 29, 2017Updated 8 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- VySecator Is a Python Script Obfuscation Tool, Which can be used to Obfuscate your hand written Malwares and your Hand Written Scripts!☆72Jun 13, 2024Updated last year
- RAT - HTTP based. Undetectable!☆52Dec 13, 2019Updated 6 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- Simple Packer PE File☆16Mar 8, 2019Updated 7 years ago
- This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the fil…☆410May 20, 2020Updated 5 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Apr 3, 2016Updated 9 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143May 30, 2019Updated 6 years ago
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- Ransomeware attack in linux☆15Aug 12, 2018Updated 7 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- IRC based botnet developed in C☆43Jul 11, 2017Updated 8 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago