vxintelligence / Thanatos-RansomwareLinks
This repository will present all Information interest about Thanatos Ransomware after analysis
☆9Updated 6 years ago
Alternatives and similar repositories for Thanatos-Ransomware
Users that are interested in Thanatos-Ransomware are comparing it to the libraries listed below
Sorting:
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 4 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- Malware Development☆11Updated 4 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Reversed source code to the Babuk ransomware builder.☆17Updated 4 years ago
- Conti Ransomware Source Code☆19Updated 3 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20Updated 4 years ago
- malware development kit for x86 windows based platforms with a linux compatible build system☆10Updated 2 years ago
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆14Updated 5 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- DarkRat source - beware untested source and resources.☆22Updated 5 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Decompiled NotPetya File Encryptor Code☆14Updated 2 years ago
- Get/dump chrome and firefox saved passwords.☆20Updated 4 years ago
- Multipurpose malware framework☆27Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Joker Botnet Source LEAKED☆12Updated 4 years ago
- Simple class to search and upload files☆28Updated 5 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 2 years ago
- Collaborative malware exchange repository.☆35Updated 8 months ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Updated 6 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- A new idea to build an anti ransomware☆24Updated 4 years ago
- An example of PE hollowing injection technique☆24Updated 6 years ago