oakkaya / Prince-RansomwareLinks
Go ransomware utilising ChaCha20 and ECIES encryption.
☆60Updated last year
Alternatives and similar repositories for Prince-Ransomware
Users that are interested in Prince-Ransomware are comparing it to the libraries listed below
Sorting:
- Proof of concept & details for CVE-2025-21298☆191Updated 10 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆148Updated 8 months ago
- ☆255Updated 4 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- ☆40Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆117Updated 6 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 8 months ago
- ☆164Updated 8 months ago
- ☆138Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆145Updated 10 months ago
- Enumerate active EDR's on the system☆146Updated 2 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆131Updated 6 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- Convert your shellcode into an ASCII string☆125Updated 5 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆137Updated 11 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆87Updated 7 months ago
- CVE-2025-33053 Proof Of Concept (PoC)☆61Updated 5 months ago
- PowerShell script to generate ShellCode in various formats☆44Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆86Updated 9 months ago
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆147Updated 8 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆260Updated last month
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆62Updated last year
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆100Updated 5 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 7 months ago
- Bypass Malware Sandbox Evasion Ram check☆141Updated 2 years ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆250Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated 11 months ago
- Windows Persistence IT-Security☆106Updated 8 months ago
- We found a way to DLL sideload with cleanmgr.exe☆95Updated 9 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆181Updated 2 years ago