LuanSilveiraSouza / rangowareLinks
Golang Ransomware
☆40Updated 4 years ago
Alternatives and similar repositories for rangoware
Users that are interested in rangoware are comparing it to the libraries listed below
Sorting:
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- ☆85Updated 2 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆98Updated 3 months ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆42Updated 6 months ago
- Golang anti-vm framework for Red Team and Pentesters☆128Updated 2 years ago
- Bypassing antivirus detection: old-school malware, new tricks☆62Updated 2 years ago
- A basic c2 / agent.☆119Updated 5 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆33Updated 3 months ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆9Updated 3 months ago
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆15Updated 7 months ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆110Updated last year
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- A C2 framework built for my bachelors thesis☆55Updated 8 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆45Updated 7 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆182Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆98Updated 3 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆58Updated last year
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆220Updated 2 years ago
- .NET Antivirus Evasion Tool (Exe2Bat)☆37Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆109Updated 2 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆83Updated 3 years ago
- ☆12Updated 5 years ago
- ☆68Updated 3 years ago