A full & Open Source compatible Petya Ransomware Executable Placeholder
☆85Jun 15, 2024Updated last year
Alternatives and similar repositories for Petya2
Users that are interested in Petya2 are comparing it to the libraries listed below
Sorting:
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆24Jul 12, 2022Updated 3 years ago
- It's my First GDI Virus with MBR Overwriting... Enjoy :D☆14May 8, 2022Updated 3 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆62May 1, 2023Updated 2 years ago
- ☆17Aug 18, 2022Updated 3 years ago
- ☆15Jan 9, 2023Updated 3 years ago
- This is my malware database, but I AM NOT RESPONSIABLE FOR ANY DAMAGE + pan koza is a skid and ready to fork this $h!t.☆12May 26, 2024Updated last year
- Hallucinate is a trojan malware (for educational purposes) similar to Maya Gold.scr and Mist. The source code will be released after Ende…☆14Jun 8, 2022Updated 3 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- WHYPETのMonoxideを無害化したもの☆10May 28, 2022Updated 3 years ago
- Yee ennoy☆12Nov 21, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Xytharis - the GDI Trojan☆15Mar 12, 2022Updated 3 years ago
- ☆14Jul 1, 2022Updated 3 years ago
- Halter is a GDI malware written in C for educational and entertaining purposes, it also playes ByteBeat audio.☆14Jun 17, 2022Updated 3 years ago
- GDI malware made by Itzsten, for educational purposes only☆13Jul 20, 2025Updated 7 months ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆58May 21, 2025Updated 9 months ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Jun 14, 2017Updated 8 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Jul 8, 2021Updated 4 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- Bypass Malware Time Delays☆107Sep 23, 2022Updated 3 years ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- ☆13Oct 10, 2022Updated 3 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- A .txt file containing the MD5 hashes for malware gathered from multiple sources☆21Mar 14, 2021Updated 4 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- ☆52Feb 8, 2024Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Dec 12, 2022Updated 3 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- C/C++ code obfuscator. Convert your code to a real one.☆12Sep 24, 2023Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Collection of various types of win32 malware & tools etc.☆26Oct 15, 2022Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- Read Readme.md☆23Jan 1, 2022Updated 4 years ago