LuanSilveiraSouza / rangowareLinks
Golang Ransomware
☆40Updated 4 years ago
Alternatives and similar repositories for rangoware
Users that are interested in rangoware are comparing it to the libraries listed below
Sorting:
- ☆85Updated 2 years ago
- Golang anti-vm framework for Red Team and Pentesters☆128Updated 2 years ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆100Updated 9 months ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆83Updated 3 years ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆221Updated 2 years ago
- 「💀」Proof of concept on BYOVD attack☆161Updated 6 months ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆97Updated 2 months ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆69Updated last month
- Red Team Operation's Defense Evasion Technique.☆53Updated last year
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆35Updated 3 months ago
- ☆133Updated last year
- Command and Control (C2) framework☆127Updated last month
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆58Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆172Updated 2 years ago
- Run Your Payload Without Running Your Payload☆182Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆81Updated last year
- Do some DLL SideLoading magic☆84Updated last year
- Patching AmsiOpenSession by forcing an error branching☆146Updated last year
- Bypass Malware Time Delays☆102Updated 2 years ago
- ☆68Updated 3 years ago
- Bypassing antivirus detection: old-school malware, new tricks☆62Updated 2 years ago
- Create Anti-Copy DRM Malware☆58Updated 10 months ago
- ☆188Updated last year
- Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)☆35Updated 7 months ago
- A collection of Cobalt Strike Aggressor scripts.☆98Updated 3 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 5 years ago