Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I have used successfully to hijack and intercept vulnerable strains executing arbitrary code pre-encryption.
☆11Jul 16, 2022Updated 3 years ago
Alternatives and similar repositories for RansomDLLs
Users that are interested in RansomDLLs are comparing it to the libraries listed below
Sorting:
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated last month
- Simple Ransomware using Python PyQt5 and Cryptography libraries. You can make the design you want using the design files.☆14Jun 11, 2022Updated 3 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 10 months ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- The greatest tool to ever grace the computers of this earth 💯☆30Feb 26, 2019Updated 7 years ago
- USB Ransomware, will encrypt SOME files and steal some, you can change what it steals.☆36Apr 22, 2024Updated last year
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Sep 1, 2025Updated 6 months ago
- ☆12Jun 26, 2023Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆33Jan 10, 2021Updated 5 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- This is a collection of stealers for educational purposes☆21Aug 13, 2025Updated 6 months ago
- This is a simple python based CLI project that can map symptoms like Aarogya Setu app. it's also generate report using matplot library an…☆10Dec 28, 2020Updated 5 years ago
- ☆10May 12, 2022Updated 3 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆15Dec 3, 2020Updated 5 years ago
- ☆12Oct 28, 2022Updated 3 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆35Jul 24, 2023Updated 2 years ago
- ☆47Jan 31, 2024Updated 2 years ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Low memory usage random access reader for csv and general files☆14Jun 16, 2022Updated 3 years ago
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- A C++17 based OTP header-only library for Windows.☆15Sep 16, 2019Updated 6 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated last month
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- ☆11Jul 15, 2024Updated last year