oakkaya / Prince-RansomwareLinks
Go ransomware utilising ChaCha20 and ECIES encryption.
☆63Updated last year
Alternatives and similar repositories for Prince-Ransomware
Users that are interested in Prince-Ransomware are comparing it to the libraries listed below
Sorting:
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆153Updated 10 months ago
- ☆262Updated 6 months ago
- Proof of concept & details for CVE-2025-21298☆194Updated last year
- Windows Persistence IT-Security☆109Updated 10 months ago
- ☆137Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- ☆41Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆138Updated 8 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 9 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 10 months ago
- ☆164Updated 10 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated last year
- Command and Control (C2) framework☆132Updated 8 months ago
- Create Anti-Copy DRM Malware☆71Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- Enumerate active EDR's on the system☆150Updated 4 months ago
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆153Updated 5 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- CVE-2025-33053 Proof Of Concept (PoC)☆64Updated 7 months ago
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆164Updated 10 months ago
- Obex – Blocking unwanted DLLs in user mode☆279Updated 4 months ago
- Payload encoding utility to effectively lower payload entropy.☆123Updated 9 months ago
- ☆189Updated 2 years ago
- POC of GITHUB simple C2 in rust☆52Updated 6 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆62Updated 8 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 11 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆183Updated 2 years ago