0x00wolf / PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python
Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends encrypted AES keys to files, and other tactics utilized by advanced threat actors like Conti, REvil, WannaCry, Ryuk, Lockbit, etc.
☆26Updated last year
Related projects ⓘ
Alternatives and complementary repositories for PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python
- MacroExploit use in excel sheet☆20Updated last year
- Simple Shellcode Runner in Rust Language☆17Updated 11 months ago
- ☆10Updated 2 weeks ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆16Updated 5 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 6 months ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆43Updated 6 months ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆40Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆23Updated 4 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆17Updated 9 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 7 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆19Updated 10 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 6 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated 11 months ago
- Make an Linux Kernel rootkit visible again.☆44Updated last month
- ☆21Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆14Updated last year
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated 3 months ago
- Cobalt Strike BOFS☆16Updated 11 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- ☆13Updated last year
- Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode☆51Updated last month
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated 10 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago