kasp4rov / H3llocker
Windows ransomware locker AES in C#
☆2Updated 8 months ago
Related projects: ⓘ
- ☆11Updated this week
- ☆10Updated this week
- Koth - TryHackMe Tricks☆138Updated 10 months ago
- ☆19Updated this week
- ⚠️ malware development☆341Updated 3 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆295Updated 3 weeks ago
- This repository contains a collection of automated scripts ( autopwn ) created for the King of the Hill (KOTH) machines on TryHackMe plat…☆16Updated 10 months ago
- Cosas copypaste☆12Updated last year
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆328Updated 9 months ago
- ☆145Updated this week
- 🐲 catppuccin kali rice☆26Updated 5 months ago
- Spearphishing tools, generate masqueraded pocket executable☆63Updated last year
- SQL Injection Vulnerability Scanner made with Python☆329Updated last year
- ☆19Updated this week
- ☆303Updated this week
- WonderCMS RCE CVE-2023-41425☆11Updated last month
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆72Updated 5 months ago
- recon for bug hunters☆447Updated this week
- Killer tool is designed to bypass AV/EDR security tools using various evasive techniques.☆709Updated 2 months ago
- my kali desktop setup☆258Updated 3 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆628Updated 4 months ago
- Uma aplicação web propositalmente vulnerável para você ownar☆44Updated 9 months ago
- Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s☆507Updated 2 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆76Updated 7 months ago
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆14Updated last month
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,137Updated 11 months ago
- My collection of malware dev links☆235Updated 2 weeks ago
- A script to protect your king in KoTH☆14Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆250Updated 3 months ago