crvvdev / cpp-ransomware
C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows
☆17Updated 2 years ago
Alternatives and similar repositories for cpp-ransomware:
Users that are interested in cpp-ransomware are comparing it to the libraries listed below
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 10 months ago
- simple user-mode Rootkit☆104Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Next gen process injection technique☆52Updated 4 years ago
- kernel to user mode APC injector☆44Updated 3 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆65Updated last year
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆84Updated 2 years ago
- ☆20Updated last year
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆41Updated last year
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated 10 months ago
- C++ Class with various techniques to detect the execution in a virtualized environment☆12Updated 10 months ago
- a stage1 DLL loader with sleep obfuscation☆35Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆17Updated 8 months ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Updated last year
- Process Injection: APC Injection☆29Updated 4 years ago
- Simple API Hooks detector☆73Updated 2 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- PoC arbitrary WPM without a process handle☆18Updated last year
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 3 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆13Updated 2 years ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- Enumerate Callbacks and all Object Types☆13Updated 2 years ago
- silence file system monitoring components by hooking their minifilters☆56Updated last year
- My Own VirtualAlloc Implementation to use as alternative unknown for all the defense solutions of VirtualAlloc Win32 API Function☆8Updated last year
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆25Updated 5 years ago