EvilBytecode / ThunderKitty-RansomwareLinks
Ransomware written in go, encrypt - decrypt.
☆25Updated 2 months ago
Alternatives and similar repositories for ThunderKitty-Ransomware
Users that are interested in ThunderKitty-Ransomware are comparing it to the libraries listed below
Sorting:
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 2 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 2 months ago
- Performs a global AMSI bypass by patching amsi.dll in memory.☆12Updated last month
- Parent Process ID Spoofing, coded in CGo.☆22Updated 2 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆47Updated 2 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆18Updated 2 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42Updated last year
- Unhook Ntdll.dll, Go & C++.☆25Updated 2 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆15Updated 2 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆38Updated 7 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- Proxy function calls through the thread pool with ease☆28Updated 4 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆44Updated 2 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆22Updated 2 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆69Updated 4 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆35Updated 2 months ago
- Repository to gather the .NET malware I will be developing☆18Updated 3 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆72Updated 2 months ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching☆11Updated 2 years ago
- The best powershell obfuscator ever made☆108Updated 2 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆10Updated 2 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago
- A malicous Golang Package☆14Updated 2 months ago
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- ☆34Updated 3 months ago
- ☆55Updated 8 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 7 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 2 months ago