AlphaDelta / DUMBLinks
A fast and advanced ransomware PoC
☆60Updated 10 years ago
Alternatives and similar repositories for DUMB
Users that are interested in DUMB are comparing it to the libraries listed below
Sorting:
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆90Updated 10 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Updated 3 years ago
- Windows Remote Access Trojan (RAT)☆84Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Tinba Banking Trojan☆87Updated 10 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Remote Windows shell☆31Updated 11 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Updated 2 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Fileless Ransomware Example☆37Updated 8 years ago
- RIG Exploit Kit (front end)☆30Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Mass malicious script dump/Malware src dump☆57Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆129Updated 12 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Malicious Software SRC Extract☆74Updated 8 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Generate customized and undetectable exploits for Metasploit.☆23Updated 8 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- Exploitkit☆185Updated 8 years ago
- Power Loader botnet☆42Updated 10 years ago