Open-Source Ransomware Project for learning purpose only written in C# (csharp). Dont use it for bad things.
☆88May 2, 2024Updated last year
Alternatives and similar repositories for teardrop
Users that are interested in teardrop are comparing it to the libraries listed below
Sorting:
- A fast and advanced ransomware PoC☆60Aug 24, 2015Updated 10 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Anywhere is a powerful botnet that allows for the remote control of compromised devices☆29Jan 19, 2023Updated 3 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- Ro3b - Advance Banking HTTP Botnet☆50Jun 12, 2023Updated 2 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- Paradise Ransomware Source☆13Sep 6, 2021Updated 4 years ago
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆20Apr 14, 2022Updated 3 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Jun 23, 2022Updated 3 years ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆33Jan 10, 2021Updated 5 years ago
- Decompiled NotPetya File Encryptor Code☆18Aug 23, 2022Updated 3 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆276Mar 1, 2021Updated 5 years ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- CVE-2021-40444 Sample☆12Sep 10, 2021Updated 4 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆19Jan 3, 2023Updated 3 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆131Feb 24, 2026Updated 3 weeks ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- An advanced Ransomware written in C++ and fully customizable☆96Sep 30, 2023Updated 2 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆144Jun 21, 2023Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆120Aug 11, 2020Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 4 months ago
- The Ranflood ransomware contrast tool☆18Dec 18, 2024Updated last year
- ☆46Jan 30, 2024Updated 2 years ago
- Camera Hack bot - Powered by XPH4N70M☆24May 26, 2023Updated 2 years ago
- GUI for building token grabbers☆35Apr 19, 2021Updated 4 years ago
- ☆29May 19, 2023Updated 2 years ago
- Welcome to my Database of Malware!☆34Dec 30, 2023Updated 2 years ago
- Java Ransomware☆128Mar 3, 2025Updated last year
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 3 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆79Mar 15, 2024Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Aug 4, 2023Updated 2 years ago
- Download a payload and make it run from registry without droppng.☆110Apr 9, 2019Updated 6 years ago