Fileless Ransomware Example
☆38Aug 2, 2017Updated 8 years ago
Alternatives and similar repositories for Tartarus
Users that are interested in Tartarus are comparing it to the libraries listed below
Sorting:
- Generate RSA keys, encrypt and decrypt data☆24Apr 8, 2021Updated 4 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- ☆11Mar 11, 2015Updated 10 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- ☆14Feb 27, 2017Updated 9 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- ☆21Feb 12, 2026Updated 2 weeks ago
- ☆24Nov 17, 2017Updated 8 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Trying for all arch detour stuff now☆11Feb 10, 2017Updated 9 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 4 months ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Multiple producer multiple consumer queue template using C++11 atomics.☆14Aug 26, 2021Updated 4 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Example of intel virtualization extensions usage☆10Dec 15, 2016Updated 9 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- fork from http://hashlib.codeplex.com☆12Oct 27, 2025Updated 4 months ago
- Automatically exported from code.google.com/p/windbgshark☆12Nov 3, 2015Updated 10 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Windows aero overlay with Direct2D & DirectWrite support☆11May 1, 2016Updated 9 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Enable custom hostname resolution without editing /etc/hosts☆10Aug 11, 2017Updated 8 years ago