rpgeeganage / file-less-ransomware-demo
Demonstrate about file-less malware approach using JavaScript
☆55Updated 7 years ago
Alternatives and similar repositories for file-less-ransomware-demo:
Users that are interested in file-less-ransomware-demo are comparing it to the libraries listed below
- Fileless Ransomware Example☆35Updated 7 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆58Updated 7 years ago
- The MacOS ransomware project☆14Updated 7 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70Updated 5 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆21Updated 10 years ago
- Liberating dem proprietary APT implants☆21Updated 5 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- Modular rootkit framework.☆27Updated 3 years ago
- Malware captured with honeypots☆35Updated 7 years ago
- Shock the shell! Exploit many injection method for shellshock☆17Updated 6 years ago
- A Python program that scans RAM.☆37Updated 10 years ago
- Twitter Bot to perform advanced search and automated response☆13Updated 7 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆41Updated 7 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆55Updated 5 years ago
- Generic malicious browser check written in C#☆13Updated 8 years ago
- ☆58Updated 7 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆32Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- Various Crypter Project☆52Updated 10 years ago
- Windows Malware monitors and infects specific kinds of files.☆16Updated 5 years ago
- Methods of C2☆21Updated 9 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 6 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 7 years ago
- Handy script to automate the attack