heittonax / LockBit-RansomWare
Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.
☆13Updated last year
Alternatives and similar repositories for LockBit-RansomWare:
Users that are interested in LockBit-RansomWare are comparing it to the libraries listed below
- ☆102Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆116Updated 8 months ago
- ProxyChecker Made in NodeJS☆36Updated 3 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- WonderCMS Authenticated RCE - CVE-2023-41425☆25Updated 3 months ago
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆14Updated 7 months ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆27Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 3 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- CVE-2024-28955 Exploitation PoC☆34Updated 9 months ago
- Multithread reverse shell listener☆24Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆36Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆21Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆74Updated last month
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆34Updated 2 weeks ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆54Updated 11 months ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 2 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆12Updated last year
- PyRAT is a powerful CTF (Capture The Flag) rootkit designed to be used in cybersecurity competitions and educational settings. It provide…☆12Updated last month
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆57Updated 9 months ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆28Updated last year
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆61Updated 6 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆94Updated last year
- This repository is a Dockerized php application containing a LFI (Local File Inclusion) vulnerability which can lead to RCE (Remote Code …☆11Updated 2 years ago
- Obsidian vault with writeups for HackTheBox/Proving Grounds boxes and cheatsheets for CPTS/OSCP preparation.☆30Updated last month
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 6 months ago
- A C2 framework inspired by anime, made in python.☆11Updated 8 months ago
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆25Updated 2 months ago