oakkaya / Prince-RansomwareLinks
Go ransomware utilising ChaCha20 and ECIES encryption.
☆65Updated last year
Alternatives and similar repositories for Prince-Ransomware
Users that are interested in Prince-Ransomware are comparing it to the libraries listed below
Sorting:
- Proof of concept & details for CVE-2025-21298☆194Updated last year
- ☆137Updated 2 years ago
- ☆262Updated 6 months ago
- CVE-2025-33053 Proof Of Concept (PoC)☆64Updated 7 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆153Updated 11 months ago
- ☆41Updated last year
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆62Updated 8 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆91Updated 9 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated last year
- Windows Persistence IT-Security☆109Updated 10 months ago
- Backdooring VSCode Projects☆124Updated 8 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 11 months ago
- We found a way to DLL sideload with cleanmgr.exe☆96Updated 11 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆153Updated 6 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 9 months ago
- Local & remote Windows DLL Proxying☆170Updated last year
- Enumerate active EDR's on the system☆150Updated 4 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆138Updated 8 months ago
- Exploit for CVE-2025-11001 or CVE-2025-11002☆147Updated 3 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated 2 years ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆106Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- Create Anti-Copy DRM Malware☆71Updated last year
- Convert your shellcode into an ASCII string☆125Updated 7 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Updated this week