guibacellar / BisquillaRansomware
The evolution of NxRansomware
☆10Updated 5 years ago
Alternatives and similar repositories for BisquillaRansomware:
Users that are interested in BisquillaRansomware are comparing it to the libraries listed below
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- POC runtime crypter☆9Updated 6 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Updated 6 years ago
- ☆7Updated 5 years ago
- ☆12Updated 4 years ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 5 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 4 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 4 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 4 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆19Updated last year
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆18Updated 5 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆15Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Simple DLL injector written in C#☆24Updated 9 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆14Updated 2 years ago
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- Hide code from dnSpy and other C# spying tools☆41Updated 4 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Updated last year
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 5 years ago
- PE Injection with ring3 hook bypass☆10Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- ☆16Updated 3 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆14Updated last year
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆20Updated 2 years ago