Open-Source Ransomware Project for learning purpose only written in C# (csharp). Dont use it for bad things.
☆88May 2, 2024Updated last year
Alternatives and similar repositories for teardrop
Users that are interested in teardrop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code of the Rensenware ransomware in .NET☆20Jul 24, 2021Updated 4 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Anywhere is a powerful botnet that allows for the remote control of compromised devices☆29Jan 19, 2023Updated 3 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Ro3b - Advance Banking HTTP Botnet☆50Jun 12, 2023Updated 2 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆20Apr 14, 2022Updated 3 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Jun 23, 2022Updated 3 years ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆33Jan 10, 2021Updated 5 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- Decompiled NotPetya File Encryptor Code☆18Aug 23, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆278Mar 1, 2021Updated 5 years ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- CVE-2021-40444 Sample☆12Sep 10, 2021Updated 4 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆19Jan 3, 2023Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- An advanced Ransomware written in C++ and fully customizable☆93Sep 30, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Ransomware Decryptors☆35Apr 28, 2022Updated 3 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Nov 25, 2020Updated 5 years ago
- My personalized Hosts file collection of various sources, cleaned and optimized specially for pDNSf☆31Updated this week
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆120Aug 11, 2020Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 4 months ago
- The Ranflood ransomware contrast tool☆18Dec 18, 2024Updated last year
- ☆47Jan 30, 2024Updated 2 years ago
- Camera Hack bot - Powered by XPH4N70M☆26May 26, 2023Updated 2 years ago
- ✔A script that turns off Windows Defender☆23May 21, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆29May 19, 2023Updated 2 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆80Mar 15, 2024Updated 2 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 3 years ago
- Download a payload and make it run from registry without droppng.☆110Apr 9, 2019Updated 7 years ago
- Crypter For Malware and Stealer☆33Apr 10, 2020Updated 6 years ago
- WARZONE RAT 1.71 CRACKED by UNKNOWN-Remote Administration Trojan-RAT☆14Aug 11, 2020Updated 5 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago