Well, I have created this shit for educational pruposes (I think)
☆38Jul 24, 2022Updated 3 years ago
Alternatives and similar repositories for ransomware-sources
Users that are interested in ransomware-sources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19May 24, 2022Updated 3 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Jan 8, 2023Updated 3 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Paradise Ransomware Source☆13Sep 6, 2021Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆14Jun 2, 2019Updated 6 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆13Dec 17, 2020Updated 5 years ago
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆18Apr 12, 2022Updated 3 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆18Jan 3, 2023Updated 3 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 2 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- Various shell code I have written☆17Oct 9, 2020Updated 5 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆51May 12, 2024Updated last year
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- APT38 Tactic PoC for Stealing 0days from security researchers☆325May 30, 2025Updated 9 months ago
- 一款基于Http.sys的利用工具 ZhuriLab/Joker 备份☆27Nov 16, 2022Updated 3 years ago
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆20Apr 14, 2022Updated 3 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- ☆28Feb 7, 2021Updated 5 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Jul 8, 2021Updated 4 years ago
- Pegasus Is A Tool Wich Has 9 Functions. Pegasus Uses Discord as C2.☆15Jan 12, 2023Updated 3 years ago
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆82May 23, 2023Updated 2 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- LPE exploit for a UAF in Windows (CVE-2021-40449).☆45Nov 5, 2021Updated 4 years ago
- Educational Java Bot Virus☆10Mar 14, 2020Updated 6 years ago