APT-42O / Munchiez-RansomwareLinks
A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial stress.
β14Updated 3 years ago
Alternatives and similar repositories for Munchiez-Ransomware
Users that are interested in Munchiez-Ransomware are comparing it to the libraries listed below
Sorting:
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ33Updated 3 years ago
- Malware vulnerability intel tool for third-party attackersβ122Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.β58Updated 4 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers β¦β50Updated 8 months ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and nativeβ¦β59Updated 3 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLβ¦β81Updated last year
- Custom pentesting toolsβ26Updated 5 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ15Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and Aβ¦β20Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detectionsβ39Updated 3 years ago
- Hashes of infamous malwareβ26Updated 2 years ago
- β53Updated 4 years ago
- Sp00fer blog post -β24Updated 3 years ago
- β27Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicatedβ¦β24Updated 3 years ago
- Create visualization from Shodan queryβ75Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of β¦β76Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is uβ¦β31Updated 4 years ago
- Modular framework to exploit UPS devicesβ65Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated 2 years ago
- WordPress version identification and vulnerability finder.β31Updated 3 years ago
- Repository and archive for Killing The Bear Gitbookβ83Updated 2 years ago
- Simple & Customizable DNS Data Exfiltratorβ113Updated 2 years ago
- Notes and IoCs of fresh malwareβ59Updated last year
- Super organized and flexible script for sending phishing campaignsβ56Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscapeβ116Updated 4 years ago
- Google Meet Phishing Template For Gophishβ48Updated 3 years ago
- β32Updated last year
- A collection of data exfiltration scripts for Red Team assessments.β97Updated 5 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark webβ16Updated last month