wille / cry
Cross platform PoC ransomware written in Go
☆248Updated 8 years ago
Alternatives and similar repositories for cry
Users that are interested in cry are comparing it to the libraries listed below
Sorting:
- GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server☆261Updated 7 years ago
- EGESPLOIT is a golang library for malware development☆342Updated 8 years ago
- A Go based HTTP Botnet☆117Updated 6 years ago
- Pure HTTP and DNS Botnet written in Golang for Windows.☆155Updated 7 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆602Updated 3 years ago
- Second Version of The GoBot Botnet, But more advanced.☆737Updated 3 years ago
- ARCANUS is a customized payload generator/handler.☆144Updated 7 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆117Updated 2 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆180Updated 2 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.☆529Updated 5 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆317Updated 6 years ago
- A tcp botnet written in golang☆103Updated 6 years ago
- Go-deliver is a payload delivery tool coded in Go.☆116Updated 6 years ago
- A simple, fully python ransomware PoC☆374Updated 4 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆174Updated 9 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆201Updated 6 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 5 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆613Updated 6 years ago
- Pythonic ransomware proof of concept.☆219Updated 5 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆995Updated 7 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆406Updated 8 years ago
- An XSS reverse shell framework☆308Updated 6 years ago
- UAC 0day, all day!☆278Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆208Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆149Updated 6 years ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Updated 6 years ago
- Malware exploits☆545Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆949Updated 6 years ago