malwarepad / toy-ransomwareLinks
Actual real-world ransomware coded in WinAPI C++ with the help of the Cryptography API made to encrypt a whole Windows installation
☆10Updated 2 years ago
Alternatives and similar repositories for toy-ransomware
Users that are interested in toy-ransomware are comparing it to the libraries listed below
Sorting:
- This is a collection of RATs for educational purposes☆49Updated 2 months ago
- Vulnerable EDR☆21Updated 10 months ago
- ☆11Updated 11 months ago
- Ransomware written in go, encrypt - decrypt.☆30Updated 5 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆237Updated last week
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆80Updated last year
- 「💽」MBR Overwrite malware for linux☆26Updated 10 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆157Updated 2 years ago
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆54Updated 2 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆132Updated 4 months ago
- Live malware samples and database, daily update.☆26Updated 5 months ago
- Nim process hollowing loader☆60Updated 2 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆84Updated 7 months ago
- Advanced dynamic malware analysis tool.☆82Updated last year
- The best powershell obfuscator ever made☆112Updated 2 months ago
- ☆70Updated 8 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆163Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆57Updated last month
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆58Updated 2 years ago
- ☆160Updated 7 months ago
- ☆41Updated last year
- "Service-less" driver loading☆161Updated 10 months ago
- Windows rootkit designed to work with BYOVD exploits☆208Updated 8 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆70Updated 4 months ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆56Updated 2 weeks ago
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆49Updated last week
- Tool designed to exfiltrate OneDrive Business OCR Data☆124Updated 8 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆122Updated 10 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 7 months ago