EvilBytecode / ThunderKitty-Ransomware
Ransomware written in go, encrypt - decrypt.
☆15Updated 2 months ago
Related projects: ⓘ
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆10Updated 2 months ago
- Unhook Ntdll.dll, Go & C++.☆11Updated 2 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆15Updated last month
- Parent Process ID Spoofing, coded in CGo.☆21Updated 2 months ago
- Go ransomware utilising ChaCha20 and ECIES encryption.☆52Updated last month
- A malicous Golang Package☆10Updated 2 months ago
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆12Updated 2 months ago
- ☆55Updated this week
- Near compile-time string obfuscation for Golang☆13Updated 11 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆64Updated 10 months ago
- Command and Control☆23Updated last month
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆20Updated this week
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆45Updated 2 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆36Updated 6 months ago
- A direct improvement to remote TLS Injection.☆15Updated 3 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆33Updated 3 weeks ago
- Section-based payload obfuscation technique for x64☆59Updated last month
- Windows Thread Pool Injection Havoc Implementation☆26Updated 5 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆19Updated 3 months ago
- Rewrite to fit my needs☆25Updated 2 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆52Updated last month
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆32Updated 8 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆35Updated 4 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆43Updated 4 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆65Updated last year
- VirusTotal Stealer is a DATA Exfiltration tool that exfitrate office documents and tunnel them over VirusTotal API to the Team Server☆62Updated 11 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆44Updated 4 months ago
- Lifetime AMSI bypass.☆35Updated 2 months ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆14Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆50Updated 6 months ago