wille / cryLinks
Cross platform PoC ransomware written in Go
☆250Updated 8 years ago
Alternatives and similar repositories for cry
Users that are interested in cry are comparing it to the libraries listed below
Sorting:
- GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server☆262Updated 8 years ago
- EGESPLOIT is a golang library for malware development☆341Updated 8 years ago
- Pure HTTP and DNS Botnet written in Golang for Windows.☆155Updated 7 years ago
- A Go based HTTP Botnet☆118Updated 6 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆602Updated 4 years ago
- Go-deliver is a payload delivery tool coded in Go.☆116Updated 7 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆181Updated 3 years ago
- A tcp botnet written in golang☆102Updated 6 years ago
- ARCANUS is a customized payload generator/handler.☆144Updated 7 years ago
- Shodan API client☆214Updated 3 years ago
- blacksheepwall is a hostname reconnaissance tool☆304Updated 5 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Updated 2 years ago
- DNS Botnet Server and Client☆35Updated 6 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆88Updated 4 months ago
- Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.☆534Updated 6 years ago
- Exploit framework written in Go☆29Updated 7 years ago
- A Go library containing a set of opinionated packages, objects, helpers and functions implemented with the KISS principle in mind.☆162Updated 2 years ago
- Second Version of The GoBot Botnet, But more advanced.☆747Updated 3 years ago
- A Go library which main purpose is giving an interface to loop over a dictionary and use those words/lines as input for some custom logic…☆56Updated 8 years ago
- ☆274Updated 4 years ago
- Phishing toolkit for red teams and pentesters.☆125Updated 7 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆208Updated 7 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Updated 7 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆202Updated 6 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- Self contained cross platform DNS recon tool☆187Updated 8 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- nextnet is a pivot point discovery tool written in Go.☆450Updated last week