Find if a decryption tool exists for the ransomware that hit you. Search by family name, or upload samples to external identification services.
Upload a ransom note or encrypted file sample to identify the ransomware strain. Run by MalwareHunterTeam.
Open ID Ransomware →Europol-led initiative with 180+ free decryption tools. Check if your ransomware has a known decryptor.
Browse Decryptors →Disconnect infected systems from the network immediately.
Do NOT delete encrypted files or ransom notes — they help with identification.
Use ID Ransomware above to determine the strain.
File a report with CISA (US), Action Fraud (UK), or local CERT.
Curated subset — NoMoreRansom has 180+ tools. See full catalog →
GandCrab Decryptor — by Bitdefender
REvil Decryptor — by Bitdefender
ShadeDecryptor — by Kaspersky
Jigsaw Decryptor — by Emsisoft
TeslaCrypt Decryptor — by ESET
Rakhni Decryptor — by Kaspersky
STOP Djvu Decryptor — by Emsisoft
Maze Decryptor — by Emsisoft
Avaddon Decryptor — by No More Ransom
Babuk Decryptor — by Avast
TargetCompany Decryptor — by Avast
AtomSilo Decryptor — by Avast
Fonix Decryptor — by Kaspersky
Hive Decryptor — by KISA
Yanluowang Decryptor — by Kaspersky
Conti Decryptor (leaked) — by Community
BlackByte Decryptor — by Trustwave
Lorenz Decryptor — by Tesorion
Ragnarok Decryptor — by Self-released
SynAck Decryptor — by Self-released