Golang Ransomware
☆41Apr 8, 2021Updated 5 years ago
Alternatives and similar repositories for rangoware
Users that are interested in rangoware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Golang ransomware☆45Dec 2, 2020Updated 5 years ago
- This project will guide yout to awareness of injection in almost every window API and process.☆24Mar 30, 2022Updated 4 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆41Jul 22, 2021Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- Myrmidex split ergo keyboard with two encoders☆14Dec 19, 2021Updated 4 years ago
- Fast and intuitive manager for multiple reverse shells☆86Dec 7, 2024Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Iterate over Windows Handles☆15Nov 18, 2025Updated 4 months ago
- UPX-like packer written in Go☆77Nov 19, 2021Updated 4 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detectio…☆19Jun 22, 2023Updated 2 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- Self-updatable RAT + C2 server + client.☆16Jun 24, 2024Updated last year
- CTF toolbox☆23Apr 2, 2023Updated 3 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 3 years ago
- A windows backdoor that's use Telegram as a C2 server.☆14Apr 11, 2024Updated last year
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆12Oct 27, 2024Updated last year
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 11 months ago
- Process injection techniques written in Go.☆66Jul 1, 2023Updated 2 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆208Jul 2, 2024Updated last year
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆43Aug 3, 2021Updated 4 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- Shellcode loader with evasion capabilities written in Nim☆16Jan 25, 2025Updated last year
- Fully functional Windows UAC bypass for Hak5 USB rubber ducky.☆29May 11, 2015Updated 10 years ago
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆20Apr 14, 2022Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- All my saved Playlists about programming and more stuff..☆24Aug 8, 2022Updated 3 years ago