AlphaDelta / DUMB
A fast and advanced ransomware PoC
☆60Updated 9 years ago
Alternatives and similar repositories for DUMB:
Users that are interested in DUMB are comparing it to the libraries listed below
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Fileless Ransomware Example☆36Updated 7 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆115Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 10 years ago
- Various Crypter Project☆51Updated 11 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Tinba Banking Trojan☆84Updated 10 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆117Updated 2 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 9 years ago
- Windows Remote Access Trojan (RAT)☆80Updated 9 years ago
- Malicious Software SRC Extract☆72Updated 8 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- Power Loader botnet☆39Updated 10 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆58Updated 9 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 7 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Better Remote Access Trojan☆48Updated 8 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆114Updated 4 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Remote Windows shell☆31Updated 10 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆26Updated 8 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 5 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago