Hellokitty Ransomware Source Code
☆18Oct 7, 2023Updated 2 years ago
Alternatives and similar repositories for Hellokitty-Ransomware-Source-Code
Users that are interested in Hellokitty-Ransomware-Source-Code are comparing it to the libraries listed below
Sorting:
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 3 years ago
- ☆14Mar 30, 2022Updated 3 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- This repository provides information and tools related to different types of malware. Each type is organized into separate folders, featu…☆19Aug 1, 2023Updated 2 years ago
- An Obsidian.md theme inspired by the Cosmodium CyberSecurity colorway.☆19Mar 5, 2024Updated last year
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆46Aug 16, 2025Updated 6 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 3 months ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, J…☆15May 18, 2019Updated 6 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- Rex Shellcode Loader for AV/EDR evasion☆35Apr 7, 2024Updated last year
- ☆31Aug 23, 2020Updated 5 years ago
- windows tiny reverse shell☆27Mar 21, 2022Updated 3 years ago
- ☆29Oct 19, 2024Updated last year
- Dynamically generated obfuscated jumps and/or function calls☆38Apr 19, 2023Updated 2 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆147May 6, 2023Updated 2 years ago
- Cross-platform SOCKS5 proxy server program/library written in C that can also reverse itself over a firewall.☆31Aug 8, 2022Updated 3 years ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆50May 4, 2025Updated 9 months ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 7 months ago
- Do some DLL SideLoading magic☆89Sep 20, 2023Updated 2 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆45Jun 24, 2023Updated 2 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- Fud Runpe Av Evasion / All Av Bypass☆32Feb 24, 2023Updated 3 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- DotRat is a Telegram Rat which includes good features and non privileged persistence. Written in C#☆12Aug 14, 2023Updated 2 years ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago