0x00wolf / PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-PythonLinks
Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends encrypted AES keys to files, and other tactics utilized by advanced threat actors like Conti, REvil, WannaCry, Ryuk, Lockbit, etc.
☆26Updated last year
Alternatives and similar repositories for PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python
Users that are interested in PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python are comparing it to the libraries listed below
Sorting:
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated last year
- Trojan written in C++ for Windows☆18Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integr…☆12Updated 11 months ago
- ☆10Updated 2 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Updated 3 years ago
- web based c2 🏴☠️☆13Updated 9 months ago
- Enumeration & fingerprint tool☆24Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆32Updated last month
- Simple Shellcode Runner in Rust Language☆17Updated last year
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Small collection of Active Directory pentesting tools.☆31Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 3 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- An offensive security framework for writing payloads☆17Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 2 years ago
- ☆10Updated 6 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- ☆25Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- RATs library 2003 to present☆14Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated 8 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago