guibacellar / BisquillaRansomware
The evolution of NxRansomware
☆10Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for BisquillaRansomware
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆18Updated last year
- POC runtime crypter☆8Updated 6 years ago
- ☆7Updated 5 years ago
- ☆14Updated 5 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆12Updated last year
- Process injection via KernelCallbackTable☆14Updated 2 years ago
- ☆12Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆37Updated 3 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- A simple injector that uses LoadLibraryA☆16Updated 4 years ago
- Remote PE reflective injection with a simple reflective loader☆29Updated 5 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- Loading and executing shellcode in C# without PInvoke.☆21Updated 2 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 2 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆15Updated 4 years ago
- Hide code from dnSpy and other C# spying tools☆40Updated 4 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 4 years ago
- ☆16Updated 5 years ago
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated 11 months ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Hide .Net assembly into png images☆35Updated 5 years ago