guibacellar / NxRansomware
A next generation of ransomware. Fully written using a .Net Framework + C&C System
☆38Updated 8 years ago
Alternatives and similar repositories for NxRansomware:
Users that are interested in NxRansomware are comparing it to the libraries listed below
- Penetration Test / Read Team - C# tools repository☆56Updated 3 years ago
- A C# DLL to Dump LSA Secrets☆57Updated 7 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.Updated 3 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆31Updated 5 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆24Updated 2 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆79Updated last year
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- medium-rare☆28Updated 5 years ago
- HTTP BOTNET☆8Updated last year
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆77Updated 6 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Updated 9 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- HTTP botnet☆59Updated 8 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago
- using VBS to download and install a powershell malware☆38Updated 5 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 6 years ago
- Automate AV evasion by calling AMSI☆87Updated last year
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- ☆43Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆16Updated last year
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆20Updated 5 years ago
- Methods of C2☆21Updated 9 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago