popescuadi / RansomwareLinks
Simple C++ ransomware, prove the concept.
☆26Updated 8 years ago
Alternatives and similar repositories for Ransomware
Users that are interested in Ransomware are comparing it to the libraries listed below
Sorting:
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Updated 6 years ago
- A Simple AES Command Line Crypter☆38Updated 2 years ago
- Simple runtime crypter in C++.☆43Updated 10 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 6 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆95Updated 4 months ago
- Sysprep Volatile Environment LPE (2017)☆15Updated 4 months ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆80Updated 2 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- A kernel rootkit with remote command and control interface for windows☆109Updated 7 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- using VBS to download and install a powershell malware☆41Updated 6 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- Disabling Windows Defender & downloading payload☆21Updated 5 years ago
- Various Crypter Project☆53Updated 11 years ago
- TaskMgr Volatile Environment LPE☆16Updated 4 months ago
- ☆39Updated 8 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- ☆42Updated 8 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆44Updated 8 years ago
- ☆13Updated 8 years ago
- Raw syscall implementations with Powershell☆29Updated 6 years ago
- Simple little rootkit made in C☆13Updated 4 years ago
- Zero-Day Code Injection and Persistence Technique☆29Updated 8 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆131Updated 4 years ago
- medium-rare☆28Updated 6 years ago
- AES Crypter for Society of Engineers Remote Access Trojan (RAT) Project Lead: Derek Ta Security Programmer: Taegan Warren☆16Updated 10 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Updated last year
- Process Hollowing techniques as used in many file Crypters (C/C++)☆85Updated 5 years ago