The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process using a linked list as the key. The program also changes the desktop wallpaper. Note: This code is for demonstration purposes only and should not be used maliciously.
☆22May 23, 2024Updated last year
Alternatives and similar repositories for k3vil
Users that are interested in k3vil are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Trading bot designed to trade top gaining or top losing assets based on CoinGecko API. Uses python and the Binance API to place orders.☆15Jan 20, 2025Updated last year
- Kevlar Benchmark: OWASP Top 10 for Agentic Apps (AI-Agents) 2026 a Red Team Benchmark☆29Jan 20, 2026Updated 2 months ago
- ☆22Sep 20, 2025Updated 6 months ago
- ☆16Jun 15, 2025Updated 9 months ago
- ☆28Apr 2, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python scripts and tools built during my learning journey☆30Nov 14, 2025Updated 4 months ago
- FantasyTalking: Realistic Talking Portrait Generation via Coherent Motion Synthesis☆10Apr 29, 2025Updated 11 months ago
- A Model Context Protocol (MCP) server for providing code context from git repositories☆24Nov 13, 2025Updated 4 months ago
- ☆15Oct 1, 2020Updated 5 years ago
- SensePost's modified hostapd for wifi attacks.☆13Oct 11, 2020Updated 5 years ago
- AudioNova is a Windows-based text-to-speech and voice transformation application.☆24Feb 24, 2025Updated last year
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 11 months ago
- Deploy IRC server using Docker☆13Dec 15, 2023Updated 2 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆44Jan 18, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Work in progress porting my blog software to Common Lisp☆10Sep 18, 2019Updated 6 years ago
- ☆36Jul 15, 2025Updated 8 months ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.☆13Jun 24, 2024Updated last year
- A set of scripts to facilitate HTTP interception on mobile apps☆22Mar 11, 2026Updated 3 weeks ago
- Next-generation imageboard software. This software development project is independent from any image hosting project.☆10Dec 11, 2022Updated 3 years ago
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆19Oct 30, 2014Updated 11 years ago
- The Control Plane for MCP — secure vault, managed runtime, audit trail, and policy-based approvals.☆39Mar 31, 2026Updated last week
- ☆15Feb 5, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- 通过Shizuku授权,实现修改部分系统设置项。☆17Apr 1, 2024Updated 2 years ago
- Bridge-bot for send and recieve VK.com messages in matrix (matrix.org).☆22Feb 19, 2022Updated 4 years ago
- 7-zip-jbinding optimized for Android, supports SAF☆13Oct 20, 2025Updated 5 months ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆15Jan 17, 2025Updated last year
- Simple Docker wrapper for LangFlow☆23May 17, 2023Updated 2 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Storage for the IOCs I collect☆11Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An oh-my-zsh plugin to create, and manage simple text cheatsheets☆14Nov 21, 2019Updated 6 years ago
- Docker containers for yunohost☆11Aug 2, 2015Updated 10 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆37Jan 6, 2025Updated last year
- SSH password crack for penetration tests using brute force and dictionary attacks.☆13Dec 19, 2025Updated 3 months ago
- minimal tool for creating a new user namespace with multiple UIDs/GIDs mapped inside☆57Jan 24, 2022Updated 4 years ago
- discord-bot A powerful discord bot with a ton of commands. It can also act as a Music bot & supports Slash Commands☆11May 21, 2023Updated 2 years ago