fozavci / ransoblinView external linksLinks
Ransoblin (Ransomware Bokoblin)
☆18Oct 4, 2020Updated 5 years ago
Alternatives and similar repositories for ransoblin
Users that are interested in ransoblin are comparing it to the libraries listed below
Sorting:
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- TA505+ Adversary Simulation☆64Nov 30, 2020Updated 5 years ago
- Petaq - Purple Team Command & Control Server☆104Dec 8, 2022Updated 3 years ago
- ☆48May 12, 2021Updated 4 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- Weaponising C# - Fundamentals Training Content☆70May 11, 2021Updated 4 years ago
- Spoof parent process ID☆13Jan 23, 2019Updated 7 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Jul 27, 2021Updated 4 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 4 years ago
- Jar Protector - Jar Crypter☆15May 18, 2018Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security☆14Nov 26, 2023Updated 2 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- Service Enumeration C# .NET Assembly☆59Sep 14, 2021Updated 4 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Really fast knock up use at own risk etc.☆18Mar 10, 2021Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆18May 25, 2022Updated 3 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆192Aug 3, 2025Updated 6 months ago
- ☆73Oct 24, 2021Updated 4 years ago
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago