Fully undetectable and evasive ransomware written in Rust, leveraging a BYOVD technique to disable AV/EDR solutions on the infected systems.
☆174Updated this week
Alternatives and similar repositories for VEN0m-Ransomware
Users that are interested in VEN0m-Ransomware are comparing it to the libraries listed below
Sorting:
- Red Team Coin for crypto-mining operations.☆23Jan 12, 2026Updated last month
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated 2 months ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 3 weeks ago
- A collaborative, multi-platform, red teaming framework☆13Jan 19, 2020Updated 6 years ago
- AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)☆224Jan 21, 2026Updated last month
- Templates for developing your own listeners and agents for AdaptixC2.☆44Feb 3, 2026Updated 3 weeks ago
- The easy way to create a working directory with standard report template files for common security scenarios: penetration testing, CTF, t…☆16Jan 5, 2024Updated 2 years ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆154Jan 3, 2026Updated last month
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- ☆55Nov 18, 2025Updated 3 months ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆24Dec 15, 2025Updated 2 months ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆83Feb 2, 2026Updated 3 weeks ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆27Jan 5, 2021Updated 5 years ago
- Inject RDPThief into memory with PowerShell.☆65Jan 21, 2025Updated last year
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- BLACK ESK SIEM is a SIEM platform built with Elasticsearch, Syslog-Ng and Kibana☆28Mar 4, 2023Updated 2 years ago
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆82Nov 15, 2025Updated 3 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆116Feb 17, 2026Updated last week
- ☆10Updated this week
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated 11 months ago
- ☆82Apr 28, 2025Updated 10 months ago
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated last month
- This script is a multi-threaded Okta password sprayer.☆71Jan 5, 2024Updated 2 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Updated this week
- ☆37Jan 1, 2023Updated 3 years ago
- Akira Bot adalah Bot Whatsapp yg Memiliki 500+ Fitur, dan Menggunakan Bermacam² Rest Api☆10Apr 6, 2021Updated 4 years ago
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- Microsoft Network Service Fingerprinting Tool☆70Jan 2, 2026Updated last month
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Jan 10, 2025Updated last year
- An full-stack eCommerce store web application in nodejs☆11Jun 6, 2024Updated last year