Python based Ransomware
☆10Dec 11, 2018Updated 7 years ago
Alternatives and similar repositories for Pysome
Users that are interested in Pysome are comparing it to the libraries listed below
Sorting:
- Basic ransomware proof of concept with Python 3.7.☆57Apr 11, 2019Updated 6 years ago
- Real-time Stop sign detection using OpenCV and Haar-cascade☆10Jul 9, 2018Updated 7 years ago
- https://github.com/Ignitetch/AdvPhishing.git☆10Apr 21, 2020Updated 5 years ago
- A simple tool that generates a bunch of 50 second clips from one video. Easily create youtube shorts and tiktoks from longer videos.☆11Feb 10, 2023Updated 3 years ago
- My version of Crunchyroll account checker.☆10Jun 4, 2021Updated 4 years ago
- IoT dashboard with Flask☆41Jan 14, 2023Updated 3 years ago
- Install Script Templates for Deploying Popular Web Frameworks on DOM Cloud☆10Feb 24, 2026Updated last week
- It exploits the chrome vulnerability and gets the all saved credentials in chrome☆10Jun 22, 2020Updated 5 years ago
- An ESP8266 powered captive portal that serves uploaded images on a HTML page.☆10May 1, 2020Updated 5 years ago
- kumpulan project pembuatan shell backdoor☆11Oct 21, 2017Updated 8 years ago
- ☆16Aug 14, 2024Updated last year
- Dashboard for Instagram Account Analytics and Growth using React, Redux, IG Blade API, Bootstrap and Apex Charts.☆13Sep 22, 2020Updated 5 years ago
- Hyden Software is a Python program designed for video creation. While it displays several advanced features such as cryptocurrency mining…☆12Feb 9, 2025Updated last year
- Arduino Rubber Ducky script to steal all saved WIFI passwords from Windows.☆12Jun 15, 2017Updated 8 years ago
- Mass Windows credential stealer payload for the BashBunny☆14Nov 27, 2017Updated 8 years ago
- Free Online Certifications in CyberSecurity☆14Apr 17, 2021Updated 4 years ago
- receive and send data of serial in Flask☆12Mar 20, 2021Updated 4 years ago
- Python control library for the Faultier fault-injection tool.☆14Sep 17, 2025Updated 5 months ago
- Password recovery payload for the BashBunny, using LaZagne.☆13Jan 7, 2021Updated 5 years ago
- Online Job Portal System is developed such that Job Seeker can search various jobs and apply for the same. Moreover Employers can also po…☆15Jul 28, 2014Updated 11 years ago
- Fetch Flipkart product details including name, price, MRP and Stock details in general as well as specific to a pincode☆15Nov 17, 2021Updated 4 years ago
- ☆15Aug 4, 2020Updated 5 years ago
- Materials for OWASP presentation on malicious JavaScript☆16Aug 30, 2010Updated 15 years ago
- A commandline backdoor accessible from the windows lock screen.☆19Feb 15, 2021Updated 5 years ago
- Python-CGI-WebApp is a simple Web Application that uses Python3 Scripts to generate a dynamic webpage. A CGI (Common Gateway Interface) …☆16Dec 20, 2017Updated 8 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- A PHP script to generate an animated GIF countdown timer.☆16Mar 17, 2016Updated 9 years ago
- A tiny tool to restrict the cursor to a specific window. Useful for games in multi-monitor setups especially with games using edge scroll…☆16May 29, 2020Updated 5 years ago
- An easy end-to-end social distancing implementation created using OpenCV!☆15May 20, 2020Updated 5 years ago
- Program bypasses the UAC prompt for Admin privileges when running a program.☆16Nov 24, 2023Updated 2 years ago
- The repository contains the Malware Projects ---> Malicious Softwares as like RansomWare , Spyware etc developed my own while learning …☆17Jan 29, 2021Updated 5 years ago
- The Library Management System is a software application that facilitates the efficient management of a library's day-to-day operations. T…☆25Jun 30, 2024Updated last year
- A new idea to build an anti ransomware☆24Oct 4, 2020Updated 5 years ago
- Sasser worm☆20Nov 16, 2015Updated 10 years ago
- Infraestructura para Big Data : Hadoop + NiFi +Spark + Hive usando Docker☆20Jan 5, 2026Updated last month
- Business search, fun with rate limiting☆20Oct 5, 2019Updated 6 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- This repo is based on the Shubhamai solutions of AICrowd Facies Identification Challenge in which we need to create a ML/DL Model to do p…☆14Oct 15, 2022Updated 3 years ago
- Notes for the course Google IT Support Professional in pdf form.☆25Nov 19, 2020Updated 5 years ago