EvilBytecode / ThunderKitty-RansomwareLinks
Ransomware written in go, encrypt - decrypt.
☆25Updated last month
Alternatives and similar repositories for ThunderKitty-Ransomware
Users that are interested in ThunderKitty-Ransomware are comparing it to the libraries listed below
Sorting:
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 2 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 2 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆15Updated last month
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Updated last month
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆46Updated last month
- Stealer in c++.☆42Updated last month
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆9Updated 2 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆18Updated last month
- Parent Process ID Spoofing, coded in CGo.☆22Updated 2 months ago
- Unhook Ntdll.dll, Go & C++.☆24Updated 2 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆35Updated last month
- Near compile-time string obfuscation for Golang☆13Updated last year
- Kill malawarebytes process. Can be ported to any programming language.☆10Updated 2 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42Updated last year
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆40Updated last month
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆19Updated 2 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆21Updated 2 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆75Updated 2 weeks ago
- ☆35Updated 8 months ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆20Updated 2 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 10 months ago
- Decrypting yandex browser passwords☆21Updated 2 months ago
- The best powershell obfuscator ever made☆109Updated 2 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 2 months ago
- ☆34Updated 2 months ago
- ☆18Updated last month
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆36Updated 6 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago