popescuadi / RansomwareLinks
Simple C++ ransomware, prove the concept.
☆26Updated 8 years ago
Alternatives and similar repositories for Ransomware
Users that are interested in Ransomware are comparing it to the libraries listed below
Sorting:
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆16Updated 6 years ago
- A Simple AES Command Line Crypter☆36Updated 2 years ago
- Simple runtime crypter in C++.☆42Updated 10 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆44Updated 8 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 6 years ago
- Disabling Windows Defender & downloading payload☆21Updated 5 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆130Updated 4 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Various Crypter Project☆52Updated 11 years ago
- ☆42Updated 8 years ago
- Sysprep Volatile Environment LPE (2017)☆15Updated 3 months ago
- TaskMgr Volatile Environment LPE☆16Updated 3 months ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- ☆24Updated 13 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Updated 3 months ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- ☆12Updated 8 years ago
- using VBS to download and install a powershell malware☆41Updated 6 years ago
- Power Loader botnet☆42Updated 10 years ago
- Zero-Day Code Injection and Persistence Technique☆29Updated 8 years ago
- XOR encryption, malware crypter☆96Updated 11 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆79Updated 2 years ago
- ☆39Updated 8 years ago
- Enter Product Key Volatile Environment LPE☆13Updated 3 months ago
- ☆13Updated 8 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago