LuanSilveiraSouza / rangowareLinks
Golang Ransomware
☆41Updated 4 years ago
Alternatives and similar repositories for rangoware
Users that are interested in rangoware are comparing it to the libraries listed below
Sorting:
- Golang anti-vm framework for Red Team and Pentesters☆128Updated 2 years ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆225Updated 2 years ago
- ☆84Updated 3 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆85Updated 3 years ago
- A collection of Cobalt Strike Aggressor scripts.☆105Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆91Updated 2 months ago
- Bypassing antivirus detection: old-school malware, new tricks☆66Updated 2 years ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆44Updated 11 months ago
- Bypass Malware Sandbox Evasion Ram check☆140Updated 2 years ago
- A basic c2 / agent.☆119Updated 5 years ago
- A C2 framework for initial access in Go☆195Updated 3 years ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Updated 2 months ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆102Updated 3 months ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆62Updated last year
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆106Updated 7 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆256Updated 2 years ago
- 「💀」Proof of concept on BYOVD attack☆164Updated 11 months ago
- Malicious Shortcut(.lnk) Generator☆86Updated 7 years ago
- ☆133Updated 2 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆87Updated 6 months ago
- 「🛡️」AVs/EDRs Evasion tool☆105Updated 11 months ago
- .NET Antivirus Evasion Tool (Exe2Bat)☆40Updated 3 years ago
- Command and Control (C2) framework☆132Updated 6 months ago
- Simple reverse shell to avoid Win 11 defender detection☆122Updated 3 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆261Updated 3 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆57Updated 2 months ago
- ☆108Updated 3 years ago