APT-42O / Munchiez-RansomwareLinks
A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial stress.
β14Updated 3 years ago
Alternatives and similar repositories for Munchiez-Ransomware
Users that are interested in Munchiez-Ransomware are comparing it to the libraries listed below
Sorting:
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ33Updated 3 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and nativeβ¦β60Updated 3 years ago
- Malware vulnerability intel tool for third-party attackersβ122Updated last year
- Hashes of infamous malwareβ26Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and Aβ¦β21Updated 2 years ago
- β53Updated 4 years ago
- Custom pentesting toolsβ26Updated 5 years ago
- β26Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ15Updated 4 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers β¦β49Updated 7 months ago
- Virus Total Free - IOC parser and report generatorβ24Updated 2 years ago
- Miscellaneous tools for BloodHoundβ18Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of β¦β76Updated last year
- Repository and archive for Killing The Bear Gitbookβ84Updated 2 years ago
- Sp00fer blog post -β24Updated 3 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.β61Updated 4 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLβ¦β80Updated last year
- Central IoC scanner based on Lokiβ20Updated 4 years ago
- Notes and IoCs of fresh malwareβ59Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscapeβ115Updated 4 years ago
- Ransomware Simulator for testing Blue Team Detectionsβ39Updated 3 years ago
- β37Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated 2 years ago
- Create visualization from Shodan queryβ75Updated 4 years ago
- WordPress version identification and vulnerability finder.β31Updated 3 years ago
- β20Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.β58Updated 4 years ago
- A library that scrapes Linkedin for user dataβ24Updated 4 years ago
- Low Interaction Mobile Honeypotβ96Updated 6 months ago
- Small enough to carry on your back (Backpack) ππ»β32Updated 2 years ago