heittonax / LockBit-RansomWareLinks
Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.
☆15Updated last year
Alternatives and similar repositories for LockBit-RansomWare
Users that are interested in LockBit-RansomWare are comparing it to the libraries listed below
Sorting:
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Persistent Powershell backdoor tool {😈}☆119Updated 10 months ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆57Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆134Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated last year
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆12Updated 2 years ago
- Simple Powershell Http shell With WEB UI☆71Updated 2 months ago
- Shellcode Loader | xss.is☆13Updated 11 months ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆8Updated 2 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆52Updated 6 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- Jasmin ransomware web panel path traversal PoC☆21Updated last year
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- ☆105Updated 2 years ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆29Updated last year
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 3 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆58Updated last year
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆87Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last month
- CVE-2024-28955 Exploitation PoC☆34Updated 11 months ago