PaulDotSH / go-evilLinks
☆12Updated last year
Alternatives and similar repositories for go-evil
Users that are interested in go-evil are comparing it to the libraries listed below
Sorting:
- A recode of the open source ransomware "Hidden Tear", this has fixes for all of the old hidden tear problems and has a bit cleaner code☆13Updated last year
- The backend for the rewritten hidden tear ransomware☆10Updated last year
- Random small pieces of code☆10Updated last year
- ChillRansomware is a Ransomware from the Chill Malware bundle☆13Updated last year
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Updated 4 years ago
- Hide malware behind a legit process C#☆128Updated 5 years ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆103Updated last year
- Fud Runpe Av Evasion / All Av Bypass☆32Updated 2 years ago
- Detect virtual environment☆67Updated 6 years ago
- NanoCore rat stub source code☆39Updated 3 years ago
- Program for remote computer management with Telegram on native C++ - by B4DB4B3☆115Updated 4 years ago
- Advanced Keylogger / Info Grabber written in C++.☆33Updated 9 months ago
- This is a RAT/Backdoor written in C++☆44Updated 5 years ago
- A tool implementing process hollowing making your PE polymorphic☆16Updated 5 years ago
- 🔷Fully telegram-controlled C++ RAT, no dedicated server needed for usage. All the features are listed in the descripton☆81Updated 3 weeks ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆58Updated 7 months ago
- File and executable crypter with comprehensible GUI and built-in anti-malicious use☆21Updated 5 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Updated 2 years ago
- BitRat Source Code☆42Updated 5 years ago
- Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks. Version > 80 is supported.☆13Updated 5 years ago
- Escalation / Bypass Windows UAC☆115Updated 6 years ago
- Injecting shellcode into a process memory and executing it in C#☆52Updated 3 years ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆94Updated 8 years ago
- Polymorph file protector☆43Updated 6 years ago
- Disable WD using VBS☆118Updated 3 years ago
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆61Updated 2 years ago
- A builder for BatchStealer☆19Updated 3 years ago
- Download a .NET payload and run it on memory☆71Updated 6 years ago
- Download a payload and make it run from registry without droppng.☆109Updated 6 years ago
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆207Updated last year