☆31Feb 28, 2025Updated last year
Alternatives and similar repositories for RansomFS
Users that are interested in RansomFS are comparing it to the libraries listed below
Sorting:
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 11 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Tracks cross references and allows fast viewing of pseudocode between references☆13Mar 10, 2025Updated 11 months ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆59Feb 21, 2026Updated last week
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- x86-64 Automated test data generator☆26Aug 18, 2025Updated 6 months ago
- Mentally ill EtwTi parser☆68Jan 11, 2026Updated last month
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- RE for champions☆15Updated this week
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- A Payload Analysis Framework☆117Oct 9, 2025Updated 4 months ago
- Port of zentool to Windows☆27Mar 7, 2025Updated 11 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 10 months ago
- ☆53Mar 26, 2025Updated 11 months ago
- Header-only C++ library for producing PE files.☆35Jun 17, 2023Updated 2 years ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆140Oct 20, 2025Updated 4 months ago
- IR drill plateform☆23Jul 29, 2025Updated 7 months ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last week
- ☆42Jan 7, 2025Updated last year
- Hooking Windows' exception dispatcher to protect process's PML4☆228Jan 24, 2025Updated last year
- Linker for Beacon Object Files☆159Feb 22, 2026Updated last week
- An example reference design for a proposed BOF PE☆200Jan 23, 2026Updated last month
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Mar 15, 2025Updated 11 months ago
- ☆164Jun 12, 2025Updated 8 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆144Updated this week
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆21Nov 4, 2024Updated last year
- Rule Engine for Dynamic Malware Analysis and Research☆25Apr 16, 2025Updated 10 months ago
- ☆25Dec 3, 2024Updated last year
- Binary rewriter for 64-bit PE files.☆100Feb 5, 2024Updated 2 years ago
- ☆157Apr 23, 2025Updated 10 months ago
- Position-independent Reflective Loader for macOS☆118Feb 19, 2026Updated last week
- Mixed Boolean Arithmetic Simplification using E-Graphs☆24May 1, 2025Updated 10 months ago
- ANY.RUN sandbox detection collection☆23Aug 21, 2024Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Feb 6, 2026Updated 3 weeks ago
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆99Dec 22, 2025Updated 2 months ago