CPScript / USB-Ransom
USB Ransomware, will encrypt SOME files and steal some, you can change what it steals... once its done, just unplug it from the PC u plugged it in. (some source code)
☆31Updated 11 months ago
Alternatives and similar repositories for USB-Ransom:
Users that are interested in USB-Ransom are comparing it to the libraries listed below
- This script exploits a vulnerability related to insecure file uploads, specifically targeting web applications that allow users to upload…☆10Updated last year
- A repository of dumb but funny malware... made my me and some friends :D☆13Updated last year
- A Simple but Strong DDoS tool used for taking out websites with certain security issues.☆13Updated last year
- USB software that takes selected files off of a PC that you plug it into☆10Updated last year
- launch spiderfoot easily from any terminal!☆10Updated last year
- A simple program to try and find the password of a wifi signal via brute force☆9Updated last year
- ✨Special✨☆9Updated this week
- view vulnerable IP cameras☆11Updated 6 months ago
- Trojan Rat Builder(310), Ransomware Builder(7), Crypter(72), Miner(9), Worm(8), Botnet(25), Virus Builder(9), Binder(25), Exploit(7), Key…☆123Updated last year
- There are many powerful viruses 💀 that can damage your PC in a matter of seconds. Batch file virus to gain full access to another comput…☆36Updated 4 years ago
- Automatic XSS Vulnerability Scanner, Dorker, and Payload Injector☆22Updated 5 months ago
- A script that uses your hotspot to phish☆9Updated last year
- A script to overwrite the mbr using python and asm☆9Updated 6 months ago
- program my own pegasus spyware using python☆26Updated 3 years ago
- A Discord token grabber (grabs wallets, passwords, cookies, discord etc.)☆8Updated 2 years ago
- Powerfull Windows Viruses by VBScript! In this file, There are many powerful viruses 💀 that can damage your PC in a matter of seconds.☆21Updated 4 years ago
- Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42),…☆21Updated 3 years ago
- Malware Repository 2018☆40Updated last year
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- HTML WannaCry Ransomware v2.0 - websites defacement injection page☆25Updated 3 years ago
- A EASY TO USE `Ngrok` backdoor creator on a IP:PORT☆9Updated last year
- BitRat 1.39 Cracked & Offline Builder☆8Updated 3 years ago
- A python trojan with spyware, info stealing and ransomware abilities.☆27Updated last year
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆16Updated 2 years ago
- GUI based tool to track location and more info of mobile numbers☆67Updated last year
- Stealthy Fully Undetectable (FUD) RAT with 15 plugins: stealer, crypto stealer, keylogger, remote desktop and more more...☆22Updated last year
- This is a DDOS tool {denial-of-service} by sending commands to botnet members. Botnet members can be called zombies and the botnet itself…☆61Updated last month
- SARA - Simple Android Ransomware Attack☆10Updated 3 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆52Updated last year
- PoC Hacking Tool Contains so many stuff like hash cracking, Crypter, Ransomware Builder, etc...☆15Updated 3 years ago