roothaxor / RansomLinks
Various codes related to Ransomware Developement
☆123Updated 8 years ago
Alternatives and similar repositories for Ransom
Users that are interested in Ransom are comparing it to the libraries listed below
Sorting:
- Pythonic ransomware proof of concept.☆219Updated 5 years ago
- Bug7sec Team - ransomware open source (web)☆132Updated 7 years ago
- Dangerous Malwares☆206Updated 8 years ago
- Seeing how easy it is to create ransomware.☆46Updated 2 years ago
- Exploitkit☆186Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- A simple, fully python ransomware PoC☆376Updated 5 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- A ctypes powered python keylogger.☆106Updated 5 years ago
- NXcrypt - 'python backdoor' framework☆366Updated 8 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆187Updated 6 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆140Updated 2 years ago
- Athena Botnet Source Code☆150Updated 9 years ago
- An open source RansomWare☆87Updated 5 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆602Updated 3 years ago
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- Inject malicious code into *.debs☆277Updated 3 years ago
- WannaCry Ransomware☆139Updated 8 years ago
- Python Remote Access Trojan☆140Updated 4 years ago
- WebShell Dump☆173Updated 8 years ago
- ☆58Updated 7 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆291Updated 7 years ago
- Malware exploits☆548Updated 5 years ago
- Worm implemented in Python☆88Updated 9 years ago
- A Phishing Dropper designed to Pentest.☆272Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆374Updated 8 years ago
- Botnet command & control monitor☆192Updated 3 years ago
- ransomware open-sources☆776Updated 4 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago