0x00wolf / PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python
Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends encrypted AES keys to files, and other tactics utilized by advanced threat actors like Conti, REvil, WannaCry, Ryuk, Lockbit, etc.
☆27Updated last year
Alternatives and similar repositories for PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python:
Users that are interested in PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python are comparing it to the libraries listed below
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- An offensive security framework for writing payloads☆17Updated 2 years ago
- ☆9Updated 3 weeks ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- Trojan written in C++ for Windows☆17Updated last year
- Malware Libraries focused in help Malware Development☆18Updated 2 years ago
- Simple Shellcode Runner in Rust Language☆17Updated last year
- Ransomware for demonstration☆15Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆29Updated this week
- CSharp4Pentesters☆12Updated 3 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 8 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 11 months ago
- Mythic C2 wrapper for NimSyscallPacker☆24Updated last month
- Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integr…☆12Updated 10 months ago
- Powerfull scripts to bypass windows defender☆9Updated 3 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆28Updated last year
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- PhantomsGate: Advanced Shellcode Injection Technique☆23Updated 9 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆12Updated 11 months ago
- Make an Linux Kernel rootkit visible again.☆50Updated 2 months ago
- Small collection of Active Directory pentesting tools.☆30Updated last year
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆33Updated 3 years ago