heittonax / LockBit-RansomWare
Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.
☆10Updated last year
Related projects ⓘ
Alternatives and complementary repositories for LockBit-RansomWare
- PowerJoker is a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.☆35Updated 6 months ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Updated 7 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆20Updated last year
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆49Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆118Updated 2 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆43Updated 6 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆32Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 5 months ago
- Malicious powershell scripts loader designed to avoid detection.☆36Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆68Updated 2 years ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆51Updated 3 weeks ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 3 weeks ago
- Red Teaming tools and techniques☆47Updated last year
- Creating a Malicious Macro using MS Word☆17Updated 2 years ago
- ☆31Updated last year
- ☆14Updated 11 months ago
- an exploit of Server-side request forgery (SSRF)☆46Updated 3 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆24Updated 8 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆55Updated 7 months ago
- Metabase Pre-auth RCE☆13Updated last year
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆23Updated 3 years ago
- Offensive Powershell obfuscator☆22Updated 2 months ago
- Simple Powershell Http shell With WEB UI☆66Updated 2 weeks ago
- ☆16Updated 6 months ago
- CVE-2024-28955 Exploitation PoC☆34Updated 4 months ago
- Undetectable payload for Windows 10 and 11☆39Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆78Updated 10 months ago
- Persistent Powershell backdoor tool {😈}☆109Updated 3 months ago