crvvdev / cpp-ransomware
C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows
☆17Updated 2 years ago
Alternatives and similar repositories for cpp-ransomware
Users that are interested in cpp-ransomware are comparing it to the libraries listed below
Sorting:
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 11 months ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- simple user-mode Rootkit☆104Updated 2 years ago
- C++ Multi-Stage Semi-Polymorphic Malware Loader.☆9Updated 3 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- kernel to user mode APC injector☆44Updated 3 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- My Own VirtualAlloc Implementation to use as alternative unknown for all the defense solutions of VirtualAlloc Win32 API Function☆8Updated last year
- C++ Class with various techniques to detect the execution in a virtualized environment☆12Updated 11 months ago
- a stage1 DLL loader with sleep obfuscation☆35Updated 2 years ago
- ☆34Updated last year
- Next gen process injection technique☆52Updated 4 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆85Updated 2 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆14Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- PoC arbitrary WPM without a process handle☆19Updated last year
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆25Updated last year
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆12Updated 9 months ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 2 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆12Updated 4 months ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 7 years ago
- Red Team Operation's Defense Evasion Technique.☆52Updated 11 months ago
- 2022 Updated Kernelmode-Code☆31Updated last year
- Manually perform syscalls without going through any external API or DLL.☆18Updated 2 years ago
- Hellokitty Ransomware Source Code☆15Updated last year