0x00wolf / PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-PythonLinks
Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends encrypted AES keys to files, and other tactics utilized by advanced threat actors like Conti, REvil, WannaCry, Ryuk, Lockbit, etc.
☆27Updated last year
Alternatives and similar repositories for PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python
Users that are interested in PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python are comparing it to the libraries listed below
Sorting:
- Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integr…☆12Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆20Updated 2 years ago
- Trojan written in C++ for Windows☆18Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆59Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆39Updated 3 months ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 9 months ago
- ☆38Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Small collection of Active Directory pentesting tools.☆31Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆18Updated 3 years ago
- An offensive security framework for writing payloads☆17Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- MalDev & AV-EDR Evasion for Pentesters☆16Updated 2 years ago
- Tool for extracting credentials locally stored by web browsers☆31Updated 3 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated last year
- Powerfull scripts to bypass windows defender☆9Updated 3 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- RegStrike is a .reg payload generator☆58Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- ☆29Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆30Updated last month
- Personal notes from Red teamer for Blue/Red/Purple.☆56Updated last year
- A script to automate keystrokes through a graphical desktop program.☆35Updated last month
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆55Updated 8 months ago