LuanSilveiraSouza / rangowareLinks
Golang Ransomware
☆40Updated 4 years ago
Alternatives and similar repositories for rangoware
Users that are interested in rangoware are comparing it to the libraries listed below
Sorting:
- Golang anti-vm framework for Red Team and Pentesters☆128Updated 2 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆84Updated 3 years ago
- ☆69Updated 4 years ago
- ☆84Updated 3 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- Bypass Malware Sandbox Evasion Ram check☆138Updated 2 years ago
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆17Updated 9 months ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated this week
- ☆133Updated 2 years ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆38Updated 2 weeks ago
- Bypassing antivirus detection: old-school malware, new tricks☆65Updated 2 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆102Updated 5 months ago
- A C2 framework for initial access in Go☆193Updated 3 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆100Updated last month
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆223Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Updated 2 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 2 years ago
- Bypass Malware Time Delays☆104Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆258Updated 2 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆61Updated last year
- Malicious Shortcut(.lnk) Generator☆85Updated 6 years ago
- ☆12Updated 5 years ago
- A basic c2 / agent.☆121Updated 5 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆156Updated 2 years ago
- A C2 framework built for my bachelors thesis☆56Updated 10 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago