APT-42O / Munchiez-RansomwareLinks
A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial stress.
☆14Updated 3 years ago
Alternatives and similar repositories for Munchiez-Ransomware
Users that are interested in Munchiez-Ransomware are comparing it to the libraries listed below
Sorting:
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated 2 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Custom pentesting tools☆25Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- ☆25Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Updated 5 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆33Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated 5 months ago
- AutoPoC Generator HoneyPoC☆35Updated 6 months ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆12Updated 4 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- ☆19Updated 4 years ago
- ☆37Updated 4 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- Bare Bones Banking malware coded for research & educational purposes☆89Updated 5 years ago