oakkaya / Prince-RansomwareLinks
Go ransomware utilising ChaCha20 and ECIES encryption.
☆62Updated last year
Alternatives and similar repositories for Prince-Ransomware
Users that are interested in Prince-Ransomware are comparing it to the libraries listed below
Sorting:
- ☆259Updated 5 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆152Updated 9 months ago
- Proof of concept & details for CVE-2025-21298☆190Updated 11 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Updated 11 months ago
- ☆137Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated 11 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- Enumerate active EDR's on the system☆146Updated 2 months ago
- Bypass Malware Sandbox Evasion Ram check☆142Updated 2 years ago
- Windows Persistence IT-Security☆108Updated 9 months ago
- ☆163Updated 2 years ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆102Updated 6 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- CVE-2025-33053 Proof Of Concept (PoC)☆62Updated 6 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆61Updated 7 months ago
- ☆40Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 10 months ago
- POC of GITHUB simple C2 in rust☆52Updated 4 months ago
- ☆40Updated 11 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆152Updated 4 months ago
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- We found a way to DLL sideload with cleanmgr.exe☆95Updated 9 months ago
- Command and Control (C2) framework☆132Updated 7 months ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆257Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Updated last year
- Create Anti-Copy DRM Malware☆70Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆281Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 7 months ago