Simple Ransoware to attack Windows πβ
β25Apr 19, 2023Updated 2 years ago
Alternatives and similar repositories for RansomwareS12
Users that are interested in RansomwareS12 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AdminX it's a Malware to execute process as some users from a Windows OSβ11May 4, 2023Updated 2 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injectionβ19Mar 18, 2023Updated 3 years ago
- Simple C++ Reverse Shellβ13Nov 22, 2022Updated 3 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keysβ32Nov 29, 2022Updated 3 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened witβ¦β14Apr 2, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OSβ61Nov 25, 2025Updated 4 months ago
- Malware Libraries focused in help Malware Developmentβ25Mar 20, 2023Updated 3 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitieβ13Jan 6, 2022Updated 4 years ago
- Easy Port Scanner with Pythonβ14Dec 3, 2021Updated 4 years ago
- Very basic Web created with HTML and JavaScript to create Online Payload to do Reverse Shellsβ12Oct 12, 2022Updated 3 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Adminβ23Aug 21, 2023Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMeβ19Aug 13, 2022Updated 3 years ago
- Threat Hijacking Simple Implementationβ20Feb 24, 2025Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisionsβ17Aug 17, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Demise is Golang malware that uses Discord for communication.β13Oct 23, 2024Updated last year
- SSH Bruteforce Basic Script created with C++ to Linuxβ10Jan 28, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websitesβ¦β13Mar 25, 2023Updated 3 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memoryβ16Jul 16, 2024Updated last year
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccessβ10Aug 1, 2021Updated 4 years ago
- Classic Process Injection with Memory Evasion Techniques implemantationβ73Oct 28, 2023Updated 2 years ago
- Pentesting Tools to Automatize Active Directory Hackingβ23Sep 20, 2022Updated 3 years ago
- Interactive shell to execute commands anonymously using Proxychains and Torβ56Feb 1, 2023Updated 3 years ago
- HTTP_POST Login BruteForceβ36Sep 26, 2022Updated 3 years ago
- NordVPN Threat Protection Proβ’ β’ AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A Windows token-theft utility that enumerates SYSTEM processes, duplicates their access token, and spawns a new process running as NT AUTβ¦β63Mar 16, 2026Updated last week
- The best Python Backdoorπβ19Dec 8, 2021Updated 4 years ago
- Keeping Vichan aliveβ17Jul 24, 2023Updated 2 years ago
- Bypassing File Upload Restriction using Magic Bytesβ22Jul 4, 2022Updated 3 years ago
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows procβ¦β26Nov 26, 2025Updated 3 months ago
- HTTP Botnet in C, Cross Compilable. (Layer 7 - Layer 4) - 11 Methodsβ33Aug 4, 2022Updated 3 years ago
- Web Scanner Toolβ24Mar 13, 2024Updated 2 years ago
- Automate Blind SQL Injection with Python.β23Aug 20, 2022Updated 3 years ago
- High-level Threat Intelligence playbooksβ20Mar 6, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Reverse shell written on python3β60Sep 16, 2020Updated 5 years ago
- # D-TECT D-TECT - Pentest the Modern Web Author: [Shawar Khan] (https://shawarkhan.com/about/) Disclaimer: I am not responsible for anyβ¦β36Jan 11, 2019Updated 7 years ago
- WhatsApp Web phishing page for authorized pentesting. Captures international phone numbers + OTP codes with pixel-perfect 2026 UI. Real-tβ¦β39Mar 6, 2026Updated 2 weeks ago
- Termux tool doxingβ39May 21, 2023Updated 2 years ago
- Heartbleed OpenSSL exploitβ14Apr 11, 2014Updated 11 years ago
- Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773β113Mar 12, 2022Updated 4 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driverβ33Sep 15, 2025Updated 6 months ago