heittonax / LockBit-RansomWareLinks
Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.
☆16Updated 2 years ago
Alternatives and similar repositories for LockBit-RansomWare
Users that are interested in LockBit-RansomWare are comparing it to the libraries listed below
Sorting:
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆121Updated 2 years ago
- Here are +200 different rats some with source code☆117Updated last year
- ☆108Updated 3 years ago
- The LockBit builder files☆135Updated last year
- This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay f…☆35Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆120Updated last year
- CryptChat: Beyond Secure Messaging 🛡️☆71Updated last year
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆48Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆27Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆82Updated last month
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆109Updated last week
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A fast subdomain takeover tool☆84Updated last year
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- CVE-2023-38831 PoC (Proof Of Concept)☆87Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploit☆104Updated 2 years ago
- backdoor exploit for vsftpd 2.3.4 on python☆15Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆65Updated 11 months ago
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆34Updated 2 years ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆81Updated 7 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆71Updated 2 years ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆121Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆61Updated last year
- 🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Sup…☆15Updated 9 months ago
- ProxyChecker Made in NodeJS☆38Updated 3 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆63Updated 9 months ago
- Simple Powershell Http shell With WEB UI☆72Updated 6 months ago