chenhao5188 / YourRansomLinks
A open source ransomware.
☆11Updated 8 years ago
Alternatives and similar repositories for YourRansom
Users that are interested in YourRansom are comparing it to the libraries listed below
Sorting:
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- Hide Mimikatz From Process Lists☆19Updated 10 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Updated 2 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Updated 7 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Updated 5 years ago
- carbanak\group_ib_smart_boys☆12Updated 7 years ago
- ☆16Updated 10 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Updated 7 years ago
- Copy xRAT repository☆22Updated 7 years ago
- Powershell to CodeExecution and ProcessInjection☆65Updated 8 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Updated 3 years ago
- ☆54Updated 7 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 8 years ago
- ☆55Updated 8 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆54Updated 7 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Updated 8 years ago
- ☆34Updated 5 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆48Updated 8 years ago
- Self defense post module for metasploit☆17Updated 6 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Updated 8 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Updated 4 years ago
- ☆37Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Updated 2 years ago
- Python implementation of RSA reverse shell.☆11Updated 9 years ago