0x00wolf / PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-PythonLinks
Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends encrypted AES keys to files, and other tactics utilized by advanced threat actors like Conti, REvil, WannaCry, Ryuk, Lockbit, etc.
☆26Updated last year
Alternatives and similar repositories for PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python
Users that are interested in PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python are comparing it to the libraries listed below
Sorting:
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integr…☆12Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 3 years ago
- ☆29Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- An offensive security framework for writing payloads☆17Updated 2 years ago
- Slides and videos from talks given at cons☆20Updated last week
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Simple Shellcode Runner in Rust Language☆17Updated last year
- web based c2 🏴☠️☆13Updated 10 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated 2 years ago
- Trojan written in C++ for Windows☆18Updated last year
- ☆10Updated 2 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆35Updated 2 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated 11 months ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Small collection of Active Directory pentesting tools.☆31Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆58Updated last year
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 3 years ago
- Python3 tool to perform password spraying using RDP☆17Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago