oakkaya / Prince-RansomwareLinks
Go ransomware utilising ChaCha20 and ECIES encryption.
☆65Updated last year
Alternatives and similar repositories for Prince-Ransomware
Users that are interested in Prince-Ransomware are comparing it to the libraries listed below
Sorting:
- ☆137Updated 2 years ago
- ☆262Updated 6 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆153Updated 11 months ago
- Proof of concept & details for CVE-2025-21298☆194Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- ☆41Updated last year
- Windows Persistence IT-Security☆109Updated 10 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 9 months ago
- Create Anti-Copy DRM Malware☆71Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 11 months ago
- CVE-2025-33053 Proof Of Concept (PoC)☆64Updated 7 months ago
- ☆163Updated 2 years ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 11 months ago
- ☆164Updated 11 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆62Updated 8 months ago
- Enumerate active EDR's on the system☆150Updated 4 months ago
- POC of GITHUB simple C2 in rust☆52Updated 6 months ago
- Convert your shellcode into an ASCII string☆125Updated 7 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 9 months ago
- Proof of Concept CVE-2025-21420 (Windows Disk Cleanup Tool EoP)☆55Updated 7 months ago
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Updated last year
- Backdooring VSCode Projects☆124Updated 8 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆153Updated 6 months ago
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year