APT-42O / Munchiez-RansomwareLinks
A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial stress.
☆14Updated 3 years ago
Alternatives and similar repositories for Munchiez-Ransomware
Users that are interested in Munchiez-Ransomware are comparing it to the libraries listed below
Sorting:
- ☆25Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- ☆53Updated 4 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆61Updated 3 years ago
- Custom pentesting tools☆25Updated 5 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆34Updated last year
- Central IoC scanner based on Loki☆20Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆49Updated 6 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Updated last year
- Command and Control Framework☆13Updated last year
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- URL fingerprinting made easy☆89Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆14Updated 5 months ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year