Viralmaniar / PhirauteeView external linksLinks
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
☆119Aug 11, 2020Updated 5 years ago
Alternatives and similar repositories for Phirautee
Users that are interested in Phirautee are comparing it to the libraries listed below
Sorting:
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- Curated list of ransomware-related resources; awesome style.☆29Jan 17, 2025Updated last year
- PowerShell payload generator☆120Sep 30, 2021Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- Routopsy - Hacking Routers with Routers☆179Jul 30, 2021Updated 4 years ago
- PHP ransomware that encrypts your files, as well as file and directory names.☆113Apr 25, 2023Updated 2 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆107Feb 12, 2023Updated 3 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Aug 6, 2020Updated 5 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Multipurpose malware framework☆28Dec 6, 2021Updated 4 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago
- My personalized Hosts file collection of various sources, cleaned and optimized specially for pDNSf☆30Updated this week
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 3 years ago
- Botnet Simulation Framework☆78Aug 6, 2020Updated 5 years ago
- SNIcat☆128Aug 19, 2021Updated 4 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆142Jun 21, 2023Updated 2 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆244Dec 10, 2020Updated 5 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 5 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Apr 3, 2021Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Dec 20, 2020Updated 5 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 6 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 5 years ago
- Overlord - Red Teaming Infrastructure Automation☆628May 28, 2024Updated last year
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 2 months ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆226Feb 9, 2021Updated 5 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆458Oct 25, 2021Updated 4 years ago
- Simple keylogger on C++ with several functions.☆16Jun 19, 2020Updated 5 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago