0x00wolf / PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-PythonLinks
Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends encrypted AES keys to files, and other tactics utilized by advanced threat actors like Conti, REvil, WannaCry, Ryuk, Lockbit, etc.
☆26Updated 2 years ago
Alternatives and similar repositories for PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python
Users that are interested in PATHBYTER-Hybrid-Encryption-Ransomware-with-Multiprocessing-in-Python are comparing it to the libraries listed below
Sorting:
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆13Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆61Updated last year
- ☆12Updated 6 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 6 months ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Updated 4 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- A C2 framework built for my bachelors thesis☆56Updated last year
- Trojan written in C++ for Windows☆18Updated last year
- This is a working variant of the Mirai IOT botnet☆14Updated 2 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆36Updated 4 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- Small collection of Active Directory pentesting tools.☆31Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- Slides and videos from talks given at cons☆25Updated 4 months ago
- ☆41Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- MalDev & AV-EDR Evasion for Pentesters☆17Updated 2 years ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Updated 2 months ago
- Malware Libraries focused in help Malware Development☆27Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆72Updated last year
- ECC Public Key Cryptography☆37Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Simple Shellcode Runner in Rust Language☆18Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Tool for extracting credentials locally stored by web browsers☆35Updated 3 years ago