EvilBytecode / ThunderKitty-RansomwareLinks
Ransomware written in go, encrypt - decrypt.
☆30Updated 7 months ago
Alternatives and similar repositories for ThunderKitty-Ransomware
Users that are interested in ThunderKitty-Ransomware are comparing it to the libraries listed below
Sorting:
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆13Updated 7 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆45Updated 7 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆57Updated 7 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 7 months ago
- Troll TaskManager, and play with it .☆28Updated 4 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆26Updated 7 months ago
- ☆49Updated last year
- A malicous Golang Package☆15Updated 7 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆40Updated 3 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆13Updated 7 months ago
- A unique introduction to native runtime obfuscation.☆74Updated 9 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 6 months ago
- The best powershell obfuscator ever made☆117Updated 4 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆80Updated 5 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆25Updated 6 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆87Updated 7 months ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 7 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 5 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆92Updated 9 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- ☆11Updated last year
- HardwareTurningPoint, Fully Go Compatible Hardware Breakpoint☆17Updated 10 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆74Updated last year
- EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.☆45Updated 3 weeks ago
- Unhook Ntdll.dll, Go & C++.☆32Updated 7 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆14Updated 7 months ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 3 years ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year