D4stiny / jWARELinks
Ransomware base in Java for all operating systems
☆19Updated 8 years ago
Alternatives and similar repositories for jWARE
Users that are interested in jWARE are comparing it to the libraries listed below
Sorting:
- Mass malicious script dump/Malware src dump☆16Updated 9 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Updated 8 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- Disabling Windows Defender & downloading payload☆21Updated 5 years ago
- Collaborative malware exchange repository.☆34Updated last year
- Decoders for 7ev3n ransomware☆17Updated 9 years ago
- Handy script to automate the attack☆22Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 6 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Updated 8 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆82Updated 7 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- PowerShell Reverse HTTPs Shell☆29Updated 11 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated 2 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Updated 8 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 6 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- Various Crypter Project☆10Updated 11 years ago
- edge --> powerpoint --> remote-file --> shell☆11Updated 6 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Updated 9 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago