bstnbuck / ItsSoEasyLinks
A Linux/Windows Ransomware PoC written in Python, Go and C
☆16Updated 2 years ago
Alternatives and similar repositories for ItsSoEasy
Users that are interested in ItsSoEasy are comparing it to the libraries listed below
Sorting:
- Sources Codes of many Office Malwares☆17Updated 2 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Educational ransomware for evaluating ransomware detection tools☆8Updated 2 years ago
- ☆24Updated 2 years ago
- ☆27Updated 4 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆12Updated 2 months ago
- Ransomware Decryptors☆36Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Curated list of enterprise ransomware defense resources☆14Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Updated 3 years ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 3 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- ☆12Updated 4 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago