EvilBytecode / ThunderKitty-Ransomware
Ransomware written in go, encrypt - decrypt.
☆15Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for ThunderKitty-Ransomware
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆15Updated 3 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆10Updated 4 months ago
- Unhook Ntdll.dll, Go & C++.☆13Updated 4 months ago
- Parent Process ID Spoofing, coded in CGo.☆21Updated 4 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆22Updated 2 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆63Updated last year
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆12Updated 4 months ago
- Near compile-time string obfuscation for Golang☆13Updated last year
- Rewrite to fit my needs☆26Updated 4 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆41Updated 8 months ago
- ☆37Updated last month
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆37Updated 6 months ago
- Go ransomware utilising ChaCha20 and ECIES encryption.☆57Updated last month
- Threadless injection via TLS callbacks☆15Updated this week
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆50Updated 4 months ago
- A malicous Golang Package☆10Updated 4 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆38Updated 11 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆55Updated 3 months ago
- Section-based payload obfuscation technique for x64☆58Updated 3 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆21Updated last year
- a demo module for the kaine agent to execute and inject assembly modules☆37Updated 2 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆44Updated 6 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated 8 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆77Updated last year
- BOF for C2 framework☆40Updated 2 weeks ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 6 months ago
- A simple rpc2socks alternative in pure Go.☆24Updated 4 months ago
- ☆47Updated last year