Well, I have created this shit for educational pruposes (I think)
☆38Jul 24, 2022Updated 3 years ago
Alternatives and similar repositories for ransomware-sources
Users that are interested in ransomware-sources are comparing it to the libraries listed below
Sorting:
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Jan 8, 2023Updated 3 years ago
- ☆19May 24, 2022Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- ☆10Jun 26, 2024Updated last year
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- ☆11Oct 6, 2022Updated 3 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 5 years ago
- Educational Java Bot Virus☆10Mar 14, 2020Updated 5 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 2 years ago
- Paradise Ransomware Source☆13Sep 6, 2021Updated 4 years ago
- LPE exploit for a UAF in Windows (CVE-2021-40449).☆45Nov 5, 2021Updated 4 years ago
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Easily read and write process memory on windows 🧠☆11Nov 1, 2022Updated 3 years ago
- ☆11Oct 24, 2022Updated 3 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Dec 24, 2019Updated 6 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆14Jun 2, 2019Updated 6 years ago
- 51Pwn Platform,为黑客而生的大数据搜索引擎,Big data search engine born for hackers☆32Oct 10, 2024Updated last year
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- Thực tập trung tâm an ninh mạng Viettel☆14Aug 25, 2017Updated 8 years ago
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 5 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Jan 10, 2024Updated 2 years ago
- ChillRansomware is a Ransomware from the Chill Malware bundle☆13May 22, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- Various shell code I have written☆17Oct 9, 2020Updated 5 years ago