theanonhackuk / ransomware-sourcesLinks
Well, I have created this shit for educational pruposes (I think)
☆37Updated 3 years ago
Alternatives and similar repositories for ransomware-sources
Users that are interested in ransomware-sources are comparing it to the libraries listed below
Sorting:
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆62Updated 2 years ago
- Conti Ransomware Source Code☆20Updated 3 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆58Updated 5 months ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Updated 3 years ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆80Updated last year
- Cronos Crypter is an simple example of crypter created for educational purposes.☆102Updated last year
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Updated 2 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆38Updated 3 years ago
- Reversed source code to the Babuk ransomware builder.☆18Updated 4 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆46Updated 3 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆66Updated last year
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆40Updated last year
- Reversed source code of the Babuk Ransomware Version 1☆20Updated 4 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 4 years ago
- Decompiled NotPetya File Encryptor Code☆16Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 3 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆17Updated 4 years ago
- Ransomware hello kitty☆23Updated 4 years ago
- Persistent & Undetectable Malware Backdoor☆30Updated last year
- ☆33Updated 2 years ago
- 🚀 Builder of Malware Loader☆13Updated 4 years ago
- Hellokitty Ransomware Source Code☆17Updated 2 years ago
- Browser and apps data stealer☆24Updated last year
- Windows Hacking FrameWork using Reverse Shell☆106Updated 7 months ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆80Updated 2 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 4 years ago
- Source code of Claw Key logger previously sold on HackForums☆57Updated 3 years ago