heittonax / LockBit-RansomWareLinks
Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.
☆17Updated 2 years ago
Alternatives and similar repositories for LockBit-RansomWare
Users that are interested in LockBit-RansomWare are comparing it to the libraries listed below
Sorting:
- ☆108Updated 3 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆121Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆73Updated 2 years ago
- Shellcode Loader | xss.is☆14Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated 11 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated 2 years ago
- execute PE in memory Filelessly☆50Updated 10 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆96Updated 2 weeks ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆33Updated 3 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Updated 3 years ago
- Undetectable payload for Windows 10 and 11☆40Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆20Updated 2 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆62Updated last year
- Here are +200 different rats some with source code☆130Updated 2 years ago
- ☆28Updated 2 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- The LockBit builder files☆142Updated last year
- ☆89Updated last year
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆75Updated last week
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated 2 years ago
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆46Updated last year
- This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay f…☆39Updated 2 years ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆66Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago