crvvdev / cpp-ransomwareLinks
C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows
β18Updated 2 years ago
Alternatives and similar repositories for cpp-ransomware
Users that are interested in cpp-ransomware are comparing it to the libraries listed below
Sorting:
- This program is used to perform reflective DLL Injection to a remote process specified by the user.β64Updated 2 years ago
- π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Pythonβ45Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malwareβ30Updated 6 years ago
- Various methods of executing shellcodeβ72Updated 2 years ago
- using the gpu to hide your payloadβ62Updated 3 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryptionβ90Updated 2 years ago
- simple user-mode Rootkitβ107Updated 3 years ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)β28Updated last year
- Listing UDP connections with remote address without sniffing.β31Updated 2 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.β111Updated 2 years ago
- A Bumblebee-inspired Crypterβ78Updated 2 years ago
- π» Windows 10 Kernel-mode rootkitβ32Updated 3 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)β73Updated last year
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderpingβ64Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcodeβ50Updated last year
- My adventures in learning about different userland malware techniques, such as syscalls, injection, unhooking or sandbox evasion.β78Updated last year
- γπ§γRing 3 Rootkit for Windows 10β57Updated 11 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secuβ¦β44Updated last year
- Windows AppLocker Driver (appid.sys) LPEβ67Updated last year
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCrβ¦β63Updated last year
- BYOVD Technique Example using viragt64 driverβ61Updated last year
- Red Team Operation's Defense Evasion Technique.β55Updated last year
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modulesβ42Updated 2 years ago
- Example of C# heap injector for x64 and x86 shellcodesβ14Updated 2 years ago
- Change hash for a signed peβ16Updated 2 years ago
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includβ¦β20Updated 7 months ago
- Kernel Mode Driver for Elevating Process Privilegesβ134Updated 2 years ago
- Next gen process injection techniqueβ54Updated 5 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.β139Updated 2 years ago
- Simple x86 Trampoline Hookβ43Updated 3 years ago