Golang ransomware
☆45Dec 2, 2020Updated 5 years ago
Alternatives and similar repositories for go-crypt
Users that are interested in go-crypt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Golang Ransomware☆41Apr 8, 2021Updated 5 years ago
- Self-updatable RAT + C2 server + client.☆16Jun 24, 2024Updated last year
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Aug 31, 2021Updated 4 years ago
- The MacOS ransomware project☆14Jun 24, 2017Updated 8 years ago
- Nj RAT Stub☆14Dec 24, 2016Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Next-Gen Stealer written in Go. Stealing from Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user on every …☆25Dec 12, 2025Updated 4 months ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Virus RAT v8.0 Beta☆29Mar 4, 2017Updated 9 years ago
- Rust Remote Access Trojan with worm capabilities☆43Dec 22, 2024Updated last year
- 🚀 Blazing fast and Powerful Stealer, no popo made with python☆25Nov 2, 2024Updated last year
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- Golang Trojan☆20Mar 15, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server☆259Jul 13, 2017Updated 8 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Apr 16, 2018Updated 8 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- SSH password crack for penetration tests using brute force and dictionary attacks.☆13Dec 19, 2025Updated 4 months ago
- Portable (static / old glibc linked) Linux binaries for red-team / blue-team☆18Feb 29, 2024Updated 2 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- ☆16Mar 25, 2023Updated 3 years ago
- Go reverse shell for Win/Linux/OSX☆17May 15, 2019Updated 6 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PoC Hacking Tool Contains so many stuff like hash cracking, Crypter, Ransomware Builder, etc...☆16Aug 27, 2021Updated 4 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 8 years ago
- AES Ransomware in batch☆12Jun 25, 2024Updated last year
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- A Rust wrapper for the Paystack API☆15Feb 9, 2026Updated 2 months ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Elf binary infector written in Go.☆217Jan 11, 2025Updated last year
- macOS shellcode loader written in Objective-C☆49Jul 15, 2022Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Jul 6, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Reverse image/video search for reddit☆11Dec 19, 2019Updated 6 years ago
- Go debug/stack utility functions.☆19Oct 9, 2020Updated 5 years ago
- The efficient, intention-preserving sequence CRDT. Guaranteed logarithmic-time operations.☆101Apr 14, 2026Updated 3 weeks ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Oct 28, 2022Updated 3 years ago
- Trojan Rat Builder(310), Ransomware Builder(7), Crypter(72), Miner(9), Worm(8), Botnet(25), Virus Builder(9), Binder(25), Exploit(7), Key…☆11Sep 10, 2021Updated 4 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆167May 28, 2025Updated 11 months ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 6 years ago