SecDbg / Prince-Ransomware
Go ransomware utilising ChaCha20 and ECIES encryption.
☆52Updated last month
Related projects: ⓘ
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆45Updated 2 months ago
- Ransomware written in go, encrypt - decrypt.☆15Updated 2 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆19Updated 3 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆10Updated 2 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆65Updated last year
- Parent Process ID Spoofing, coded in CGo.☆21Updated 2 months ago
- ☆55Updated this week
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆38Updated 3 months ago
- Unhook Ntdll.dll, Go & C++.☆11Updated 2 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆64Updated 10 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- A malicous Golang Package☆10Updated 2 months ago
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- VirusTotal Stealer is a DATA Exfiltration tool that exfitrate office documents and tunnel them over VirusTotal API to the Team Server☆62Updated 11 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆31Updated 10 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆63Updated 4 months ago
- PowerShell script to generate ShellCode in various formats☆22Updated 2 weeks ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆39Updated last year
- RegStrike is a .reg payload generator☆55Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆25Updated 6 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆37Updated 9 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆34Updated 3 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆51Updated 7 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆20Updated this week
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆51Updated last month
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆68Updated 7 months ago
- Windows Thread Pool Injection Havoc Implementation☆26Updated 5 months ago
- Just another C2 Redirector using CloudFlare.☆76Updated 4 months ago
- Source code and examples for PassiveAggression☆54Updated 3 months ago
- ☆27Updated this week