CryptoJoker is an open source ransomware written in C# created for education purposes only.
☆22Jul 8, 2017Updated 8 years ago
Alternatives and similar repositories for CryptoJoker
Users that are interested in CryptoJoker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Aug 27, 2017Updated 8 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆26Feb 19, 2021Updated 5 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Jan 23, 2017Updated 9 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- Ransomware is a project written in .Net and shows how ransomeware generally works. This repository should be used for educational reasons…☆33Jan 9, 2025Updated last year
- CryptoTrojan in Python (For educational purpose ONLY)☆50Mar 23, 2018Updated 8 years ago
- Keep It Secure Private Data Encryption & Decryption Tool☆46Mar 11, 2018Updated 8 years ago
- Experimental examples of Ransomware in different languages☆37Nov 21, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Ransomeware attack in linux☆15Aug 12, 2018Updated 7 years ago
- A simple KeyLogger written in Plain JavaScript. Send data to PHP server.☆21Aug 25, 2018Updated 7 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- $2100 .Exe to .Doc Exploit (Python)☆52Dec 19, 2020Updated 5 years ago
- Windows Ransomware PoC☆15Dec 22, 2019Updated 6 years ago
- Bitdefender's Linux.Encoder.1 Decrypter☆17Nov 17, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆52Jun 12, 2025Updated 9 months ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- A new idea to build an anti ransomware☆24Oct 4, 2020Updated 5 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Mar 10, 2023Updated 3 years ago
- ☆21Aug 19, 2017Updated 8 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year