USB Ransomware, will encrypt SOME files and steal some, you can change what it steals.
☆34Apr 22, 2024Updated 2 years ago
Alternatives and similar repositories for USB-Ransom
Users that are interested in USB-Ransom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple bash script to install and run tor in linux☆12Nov 2, 2023Updated 2 years ago
- This script exploits a vulnerability related to insecure file uploads, specifically targeting web applications that allow users to upload…☆14Feb 28, 2024Updated 2 years ago
- Easily Install Ngrok on Linux☆15Jan 8, 2024Updated 2 years ago
- A repository of dumb but funny malware... made my me and some friends :D☆12Nov 5, 2023Updated 2 years ago
- ✨Special✨☆10Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- launch spiderfoot easily from any terminal!☆15Oct 31, 2023Updated 2 years ago
- A Python program that has a couple of Bitcoin tools...☆31Feb 28, 2024Updated 2 years ago
- Make your Android phone a hacking device with this very simple installation menu☆23Jul 1, 2025Updated 10 months ago
- A Simple but Strong DDoS tool used for taking out websites with certain security issues.☆15Feb 26, 2024Updated 2 years ago
- A wireless access point orchestration framework that leverages Linux networking subsystems to create software-defined network infrastruct…☆41Apr 16, 2025Updated last year
- Setup a OpenVPN server on your phone and let other devices connect!☆32Mar 7, 2024Updated 2 years ago
- HorrorTrojan 1.0 + source code. No sources for other versions as i lost them by accidentaly deleting them (2.0, 3.0, special edition and …☆12Mar 28, 2022Updated 4 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Java Ransomware☆129Apr 18, 2026Updated last week
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Mar 13, 2026Updated last month
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- A Universal Android NFC research and analysis toolkit. Made for Android security researchers and developers. Clone, analyze, and test con…☆56Feb 3, 2026Updated 2 months ago
- Unofficial Headscale APT (Debian/Ubuntu) repository☆17Mar 4, 2026Updated last month
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆33Jan 10, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Modified Version of the MEMZ Trojan for Vinesauce Joel☆17Mar 6, 2023Updated 3 years ago
- Simple Ransomware using Python PyQt5 and Cryptography libraries. You can make the design you want using the design files.☆15Jun 11, 2022Updated 3 years ago
- Vaccinating against WannaCry ransomware: a free tool by Minerva's research team☆24May 15, 2017Updated 8 years ago
- A Linux Cyptomining malware☆38May 5, 2023Updated 2 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- An advanced Discord ChatGPT bot built with NodeJs, Typescript and OpenAI API.☆23Feb 12, 2024Updated 2 years ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- There are many powerful viruses 💀 that can damage your PC in a matter of seconds. Batch file virus to gain full access to another comput…☆51Mar 7, 2021Updated 5 years ago
- ☆21Mar 16, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆23Jul 12, 2022Updated 3 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Jan 13, 2024Updated 2 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- This repo provide rule groups for Little Snitch based on unified host list to block ads, malware, fake news , gambling and porn☆28Apr 24, 2026Updated last week
- A self-hosted Armory implementation.☆24Jan 1, 2026Updated 4 months ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆20Jan 3, 2023Updated 3 years ago