000JustMe / PewCryptLinks
PewCrypt Ransomware Source
☆59Updated 6 years ago
Alternatives and similar repositories for PewCrypt
Users that are interested in PewCrypt are comparing it to the libraries listed below
Sorting:
- Ransomware base in Java for all operating systems☆19Updated 8 years ago
- A fast and advanced ransomware PoC☆60Updated 10 years ago
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆142Updated 6 months ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Mass malicious script dump/Malware src dump☆16Updated 9 years ago
- An ARP Poisoning Defender script☆42Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- APT34/OILRIG leak☆11Updated 6 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 9 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- Free Malware Samples☆17Updated 8 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 8 years ago
- Short little AV Test to check Detection Rates☆20Updated 4 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Updated 6 years ago
- A HTTP bot in Java with basic commands and ability's☆10Updated 10 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆47Updated 5 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- SWF Vulnerability & Information Scanner☆18Updated 7 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Updated 8 years ago
- modzero DNS Masquerading Server for Windows☆46Updated 7 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- Get detailed information about a Twitter user activity☆17Updated 8 years ago
- ☆29Updated 5 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Updated 3 years ago
- ☆39Updated 9 years ago