wille / cry
Cross platform PoC ransomware written in Go
☆245Updated 8 years ago
Alternatives and similar repositories for cry:
Users that are interested in cry are comparing it to the libraries listed below
- EGESPLOIT is a golang library for malware development☆341Updated 8 years ago
- GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server☆261Updated 7 years ago
- Pure HTTP and DNS Botnet written in Golang for Windows.☆155Updated 7 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆602Updated 3 years ago
- A Go based HTTP Botnet☆117Updated 6 years ago
- ARCANUS is a customized payload generator/handler.☆144Updated 7 years ago
- Malware exploits☆543Updated 5 years ago
- blacksheepwall is a hostname reconnaissance tool☆301Updated 4 years ago
- Go-deliver is a payload delivery tool coded in Go.☆116Updated 6 years ago
- Second Version of The GoBot Botnet, But more advanced.☆734Updated 3 years ago
- Open source offensive security platform for red team, by red team.☆383Updated 7 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆406Updated 8 years ago
- transform your payload.exe into one fake word doc (.ppt)☆465Updated 5 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆117Updated 2 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆694Updated last year
- An XSS reverse shell framework☆306Updated 6 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆179Updated 2 years ago
- A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆86Updated 3 months ago
- A simple, fully python ransomware PoC☆373Updated 4 years ago
- Pythonic ransomware proof of concept.☆216Updated 4 years ago
- EternalRocks worm☆455Updated 7 years ago
- myBFF - a Brute Force Framework☆140Updated 3 weeks ago
- Teaching old shellcode new tricks☆205Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆149Updated 6 years ago
- Self contained cross platform DNS recon tool☆187Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 2 years ago
- NXcrypt - 'python backdoor' framework☆363Updated 7 years ago