Anywhere is a powerful botnet that allows for the remote control of compromised devices
☆29Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for Anywhere
Users that are interested in Anywhere are comparing it to the libraries listed below
Sorting:
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆131Feb 24, 2026Updated 3 weeks ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Jan 13, 2024Updated 2 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- An advanced Ransomware written in C++ and fully customizable☆96Sep 30, 2023Updated 2 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- JNI-AntiDump/Debugging☆20Sep 11, 2025Updated 6 months ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Ransomware Decryptors☆35Apr 28, 2022Updated 3 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 7 years ago
- Easily deploy xmrig for cryptonight mining.☆12Aug 10, 2020Updated 5 years ago
- Ro3b - Advance Banking HTTP Botnet☆50Jun 12, 2023Updated 2 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Mar 21, 2018Updated 8 years ago
- 👾- An open-source post-exploitation framework, researchers and developers.☆56Jul 29, 2023Updated 2 years ago
- make virus without coding☆12Apr 7, 2020Updated 5 years ago
- My personalized Hosts file collection of various sources, cleaned and optimized specially for pDNSf☆31Updated this week
- Reverse Socks5 proxy for windows☆16Oct 13, 2022Updated 3 years ago
- Java Ransomware☆128Mar 3, 2025Updated last year
- The Ranflood ransomware contrast tool☆18Dec 18, 2024Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- Camera Hack bot - Powered by XPH4N70M☆24May 26, 2023Updated 2 years ago
- A Fantasy Grounds module to implement the SW5e game. A home-brew (OGL) rule set based in the Star Wars universe, legends, and lore.☆11May 23, 2023Updated 2 years ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆33Jan 10, 2021Updated 5 years ago
- A Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.☆25Dec 27, 2016Updated 9 years ago
- AXIS Botnet☆17May 16, 2024Updated last year
- Track torrent downloads☆14Dec 9, 2022Updated 3 years ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- android virus to annoy your friends☆46Jan 11, 2023Updated 3 years ago
- A Windows Logon / Startup / Scheduled Task Script for Ransomware Detection & Early-Warning☆38Nov 18, 2019Updated 6 years ago
- Keep It Secure Private Data Encryption & Decryption Tool☆46Mar 11, 2018Updated 8 years ago
- Vaccinating against WannaCry ransomware: a free tool by Minerva's research team☆24May 15, 2017Updated 8 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆22Jan 25, 2022Updated 4 years ago
- This is a repository containing Python code examples for educational purposes in the field of cybersecurity. The code covers topics such …☆80Mar 18, 2025Updated last year