vasco2016 / ransomware
Seeing how easy it is to create ransomware.
☆46Updated 2 years ago
Alternatives and similar repositories for ransomware:
Users that are interested in ransomware are comparing it to the libraries listed below
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Reverse Shell over TCP backdoor☆50Updated 6 years ago
- Better Remote Access Trojan☆48Updated 8 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 5 years ago
- A ctypes powered python keylogger.☆105Updated 5 years ago
- Linux backdoor implementation written in Python☆57Updated 9 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆115Updated 8 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆88Updated 9 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 10 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- Python Powered Repository☆16Updated 5 years ago
- This is a advanced ransomware example made in AutoIt☆34Updated 8 years ago
- Remote Windows shell☆31Updated 10 years ago
- simple reverse tcp backdoor hack☆63Updated 4 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- Tinba Banking Trojan☆84Updated 10 years ago
- Simple keylogger for Windows with HTML output and FTP upload.☆33Updated 10 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Updated 8 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- pwning & info gathering via user browser☆39Updated 9 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Simple Remote Access Trojan☆21Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Phishing webapp generator☆41Updated 6 years ago
- SQL SERVER Exploitation.☆27Updated 8 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆58Updated 9 years ago
- Fileless Ransomware Example☆36Updated 7 years ago