guibacellar / NxRansomwareView external linksLinks
A next generation of ransomware. Fully written using a .Net Framework + C&C System
☆40May 30, 2016Updated 9 years ago
Alternatives and similar repositories for NxRansomware
Users that are interested in NxRansomware are comparing it to the libraries listed below
Sorting:
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Google Project Zero OS X Vul Report Analysis☆32Apr 5, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 4 years ago
- ☆59May 1, 2019Updated 6 years ago
- Process Hacker 2 hiding from external applications☆19Jun 2, 2015Updated 10 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Integer overflow in IOHIDDevice/IOUSBHIDDevice☆20Jun 3, 2016Updated 9 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- DNCI - Dot Net Code Injector☆148Jan 11, 2021Updated 5 years ago
- easy ransomware module base on csharp.☆130Jul 18, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Demos of various (also non standard) persistence methods used by malware☆224Mar 5, 2023Updated 2 years ago
- a very simple rootkit for fun☆19Nov 6, 2018Updated 7 years ago
- Writeup and scripts for the 2021 malwarebytes crackme☆11Nov 9, 2021Updated 4 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- ☆15Apr 8, 2023Updated 2 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- iOS malware samples☆43May 13, 2016Updated 9 years ago
- Python 3 server used to control SK8RAT implant☆36Jan 5, 2021Updated 5 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- Repository for Tor's DNS-related issues.☆17Dec 19, 2016Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 9 years ago