SegoCode / Ramonware
AES Ransomware in batch
☆11Updated 8 months ago
Alternatives and similar repositories for Ramonware:
Users that are interested in Ramonware are comparing it to the libraries listed below
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- C# Admin Control Panel Finder For Windows☆42Updated 5 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 4 years ago
- pen testing scripts☆11Updated 4 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆14Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- pour plus de tutos veuillez visiter le site☆11Updated 4 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆16Updated 3 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Simple class to search and upload files☆27Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- fully automated c# reverse shells with automated ssh tunneling☆5Updated 4 years ago
- Cyb3rpin7a Tool is keylogger when we run python file on victim pc it's work like trojan and tack screenshot in ever 5 seconds from victim…☆10Updated 4 years ago
- using VBS to download and install a powershell malware☆39Updated 5 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Updated 8 months ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago