EvilBytecode / ThunderKitty-RansomwareLinks
Ransomware written in go, encrypt - decrypt.
☆30Updated 6 months ago
Alternatives and similar repositories for ThunderKitty-Ransomware
Users that are interested in ThunderKitty-Ransomware are comparing it to the libraries listed below
Sorting:
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆56Updated 6 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆13Updated 6 months ago
- ☆49Updated last year
- Troll TaskManager, and play with it .☆28Updated 3 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆39Updated 3 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆44Updated 6 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 6 months ago
- The best powershell obfuscator ever made☆115Updated 3 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆25Updated 6 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆19Updated 3 weeks ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆52Updated 6 months ago
- Unhook Ntdll.dll, Go & C++.☆31Updated 6 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆26Updated 6 months ago
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆35Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆98Updated last year
- A unique introduction to native runtime obfuscation.☆73Updated 8 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆13Updated 6 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆80Updated 4 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 4 months ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆14Updated 5 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆90Updated 9 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆86Updated 6 months ago
- Public repo of some woking evilginx phishlets☆38Updated last year
- Just another repository for malware development☆12Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year