A Ransomware Builder and Crypter target Windows operating system --- Fully Undetectable as of data 27.02.22
☆34Sep 28, 2022Updated 3 years ago
Alternatives and similar repositories for Fortuna-FUD-Crypter
Users that are interested in Fortuna-FUD-Crypter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Communicate between user-mode and kernel-mode through a swapped QWORD pointer argument.☆182Feb 9, 2022Updated 4 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆17Jul 6, 2021Updated 4 years ago
- ☆15Mar 17, 2025Updated last year
- Polymorphic Stub Creator☆34Jun 11, 2017Updated 8 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Fud Runpe Av Evasion / All Av Bypass☆31Feb 24, 2023Updated 3 years ago
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- ☆16Jan 12, 2022Updated 4 years ago
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆21Apr 2, 2025Updated last year
- Satori botnet variant☆13Mar 19, 2022Updated 4 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- * DigiPass is a script use for the Digispark usb, as a BadUSB or RubberDucky. Load, attack, and watch the passwords from the victims web …☆23Oct 26, 2023Updated 2 years ago
- The best FUD Crypter to make your .exe Trojan fully Undetectable from all AV's and protections☆19Oct 14, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 🧿Join your two exe files☆13Jul 14, 2020Updated 5 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- PoC Hacking Tool Contains so many stuff like hash cracking, Crypter, Ransomware Builder, etc...☆16Aug 27, 2021Updated 4 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 8 months ago
- Windows process injection methods☆19Jul 18, 2021Updated 4 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- Trojan Rat Builder(310), Ransomware Builder(7), Crypter(72), Miner(9), Worm(8), Botnet(25), Virus Builder(9), Binder(25), Exploit(7), Key…☆11Sep 10, 2021Updated 4 years ago
- ☆24Nov 28, 2021Updated 4 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A runtime Crypter written in C++ to bypass AVs signature based detection☆41Apr 7, 2023Updated 3 years ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Run-time loader and patcher☆15Sep 22, 2018Updated 7 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Nov 12, 2017Updated 8 years ago
- ☆17May 2, 2019Updated 6 years ago
- It contains malicious features that can steal files from BitRAT tools.☆12Dec 19, 2021Updated 4 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆44Aug 1, 2021Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Jul 12, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A C++ crypto clipper with persistence and mutex☆33Jan 23, 2022Updated 4 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆26Oct 21, 2023Updated 2 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- File and executable crypter with comprehensible GUI and built-in anti-malicious use☆21Sep 3, 2020Updated 5 years ago
- x64dbg scripts for finding OEP of packers☆15Oct 22, 2018Updated 7 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆22Jan 28, 2021Updated 5 years ago