vasco2016 / ransomware
Seeing how easy it is to create ransomware.
☆46Updated 2 years ago
Alternatives and similar repositories for ransomware:
Users that are interested in ransomware are comparing it to the libraries listed below
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Better Remote Access Trojan☆48Updated 8 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆58Updated 7 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- A ctypes powered python keylogger.☆104Updated 5 years ago
- Malware Dump☆20Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆51Updated 7 years ago
- Linux backdoor implementation written in Python☆57Updated 9 years ago
- Fileless Ransomware Example☆35Updated 7 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 7 years ago
- Keylogger Code In C++ Will Work On Window 7, 8, 8.1, And 10☆78Updated 6 years ago
- Remote Windows shell☆30Updated 10 years ago
- Various codes related to Ransomware Developement☆122Updated 7 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆115Updated 8 years ago
- A Python program that scans RAM.☆37Updated 10 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 8 years ago
- Simple Remote Access Trojan☆21Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆60Updated 9 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆28Updated 9 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆76Updated 6 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- Malicious Software SRC Extract☆71Updated 8 years ago