Go ransomware utilising ChaCha20 and ECIES encryption.
☆66Jul 3, 2024Updated last year
Alternatives and similar repositories for Prince-Ransomware
Users that are interested in Prince-Ransomware are comparing it to the libraries listed below
Sorting:
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆28Oct 2, 2024Updated last year
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- repo about binary exploitation☆12Dec 5, 2023Updated 2 years ago
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13May 16, 2023Updated 2 years ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆12Feb 14, 2019Updated 7 years ago
- ☆12Jul 31, 2024Updated last year
- PortBender修改为exe版本☆29Jul 24, 2023Updated 2 years ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated 11 months ago
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 7 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 8 months ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Find command injection and format string bugs in binaries☆17Feb 2, 2024Updated 2 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 8 months ago
- The PoC for CVE-2025-70795 / CVE-2026-0828 and its update☆37Feb 16, 2026Updated last week
- A dynamic HTTP/S stager that lets one shellcode loader be reused for different encrypted payloads - no rebuilds.☆19Oct 1, 2025Updated 4 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Golang Implementation of Hell's gate☆21May 31, 2023Updated 2 years ago
- Local Privilege Escalation Affecting Millions of Gaming Laptops☆61Jan 19, 2026Updated last month
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- A nim implementation of sRDI☆20Oct 18, 2023Updated 2 years ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆29Jun 9, 2025Updated 8 months ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 7 months ago
- Malware traffic obfuscation library☆39Jul 24, 2025Updated 7 months ago
- Generate Proxy DLLs in Rust☆47Sep 2, 2025Updated 5 months ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- AppLocker-Based EDR Neutralization☆321Dec 19, 2025Updated 2 months ago
- If you only have hash, you can still operate exchange☆78Oct 21, 2021Updated 4 years ago
- ☆50Jul 9, 2025Updated 7 months ago
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆75Dec 10, 2025Updated 2 months ago
- CTF&RealWorld challenges☆26Oct 18, 2019Updated 6 years ago
- Collection of Rust repos useful for Red Teamers.☆34Sep 23, 2022Updated 3 years ago
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- MS17-010 Exploits With Original NSA Tool(only for windows)☆31Jul 30, 2024Updated last year