EvilBytecode / ThunderKitty-Ransomware
Ransomware written in go, encrypt - decrypt.
☆16Updated 8 months ago
Alternatives and similar repositories for ThunderKitty-Ransomware:
Users that are interested in ThunderKitty-Ransomware are comparing it to the libraries listed below
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆11Updated 8 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆18Updated 7 months ago
- Unhook Ntdll.dll, Go & C++.☆19Updated 7 months ago
- Near compile-time string obfuscation for Golang☆13Updated last year
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆12Updated 8 months ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated 8 months ago
- A malicous Golang Package☆13Updated 8 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆69Updated last month
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆43Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 5 months ago
- Reasonably undetected shellcode stager and executer.☆35Updated 5 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 6 months ago
- ☆53Updated 4 months ago
- Section-based payload obfuscation technique for x64☆59Updated 6 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆41Updated 9 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆66Updated last year
- Sryxen aka ThunderKitty.☆31Updated 3 weeks ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆42Updated 8 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated 11 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆10Updated 6 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆36Updated 6 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆81Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆18Updated 3 weeks ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆41Updated 7 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆56Updated 8 months ago
- Construct the payload at runtime using an array of offsets☆61Updated 8 months ago
- Rewrite to fit my needs☆27Updated 7 months ago