malwarepad / toy-ransomwareLinks
Actual real-world ransomware coded in WinAPI C++ with the help of the Cryptography API made to encrypt a whole Windows installation
☆10Updated 2 years ago
Alternatives and similar repositories for toy-ransomware
Users that are interested in toy-ransomware are comparing it to the libraries listed below
Sorting:
- This is a collection of RATs for educational purposes☆52Updated 4 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆63Updated last month
- 「💽」MBR Overwrite malware for linux☆27Updated last year
- Windows rootkit designed to work with BYOVD exploits☆211Updated 10 months ago
- Live malware samples and database, daily update.☆30Updated 7 months ago
- Vulnerable EDR☆23Updated last year
- ☆12Updated last year
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆260Updated 2 months ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆17Updated last year
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆163Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 11 months ago
- "Service-less" driver loading☆166Updated last year
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆118Updated 6 months ago
- kernel-mode DLL Injector☆120Updated 7 months ago
- Admin to Kernel code execution using the KSecDD driver☆260Updated last year
- ☆164Updated 9 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆167Updated last year
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆56Updated 4 months ago
- simple user-mode Rootkit☆107Updated 3 years ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆121Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆158Updated 4 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆134Updated 6 months ago
- ☆108Updated last year
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 2 months ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆81Updated last year
- ☆71Updated 10 months ago
- Obex – Blocking unwanted DLLs in user mode☆275Updated 2 months ago
- Nim process hollowing loader☆61Updated 4 months ago