biitez / AWare
PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP
☆24Updated 2 years ago
Alternatives and similar repositories for AWare:
Users that are interested in AWare are comparing it to the libraries listed below
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- My doodles as I learn C#☆75Updated 4 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆12Updated 3 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆38Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆23Updated 2 years ago
- Reverse shell macro using Word VBA☆13Updated 4 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- all published scripts devloped by ahmed khlief☆20Updated 4 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- I used this to see if an EDR is running in Safe Mode☆35Updated 4 years ago
- Unpacking tool for the zipExec Crypter☆13Updated 3 years ago
- XOR crypt/decrypt using C#☆12Updated 4 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- ☆11Updated 4 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆18Updated last year
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- ☆16Updated 5 years ago
- ☆17Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated this week