wille / cry
Cross platform PoC ransomware written in Go
☆244Updated 7 years ago
Alternatives and similar repositories for cry:
Users that are interested in cry are comparing it to the libraries listed below
- GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server☆261Updated 7 years ago
- EGESPLOIT is a golang library for malware development☆340Updated 7 years ago
- A Go based HTTP Botnet☆119Updated 6 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆598Updated 3 years ago
- Pure HTTP and DNS Botnet written in Golang for Windows.☆154Updated 7 years ago
- Second Version of The GoBot Botnet, But more advanced.☆731Updated 3 years ago
- ☆275Updated 3 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 6 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆117Updated last year
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆176Updated 2 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆984Updated 7 years ago
- ARCANUS is a customized payload generator/handler.☆143Updated 6 years ago
- Go-deliver is a payload delivery tool coded in Go.☆117Updated 6 years ago
- Malware exploits☆538Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆435Updated 7 years ago
- A simple, fully python ransomware PoC☆370Updated 4 years ago
- Teaching old shellcode new tricks☆203Updated 7 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆685Updated 10 months ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆407Updated 8 years ago
- Exploitkit☆184Updated 8 years ago
- transform your payload.exe into one fake word doc (.ppt)☆462Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆206Updated 7 years ago
- Open source offensive security platform for red team, by red team.☆382Updated 7 years ago
- An XSS reverse shell framework☆305Updated 6 years ago
- Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.☆520Updated 5 years ago
- WebShell Dump☆171Updated 8 years ago