A proof-of-concept Node.js ransomware
☆21Mar 27, 2022Updated 4 years ago
Alternatives and similar repositories for Ransomware
Users that are interested in Ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🔒 A Node.js ransomware implementation.☆11Jun 17, 2021Updated 4 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Updated this week
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Aug 5, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Hello, Attack Surface Scan, BurpSuite完全被动扫描插件,不主动发送任何请求,适合挂机使用。☆24Jul 10, 2022Updated 3 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆19Mar 30, 2021Updated 5 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated 2 years ago
- ADDS (Active Directory Domain Services)☆28Mar 25, 2026Updated 2 weeks ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- This is a RAT/Backdoor written in C++☆44Dec 30, 2020Updated 5 years ago
- D-RAT [VB.NET]+[MySQL]+[PHP]☆15Jun 10, 2020Updated 5 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆25Aug 19, 2024Updated last year
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- Remote command shell application written in C# targeting the .NET runtime.☆29Mar 8, 2026Updated last month
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- ☆17Mar 21, 2019Updated 7 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆17Feb 23, 2021Updated 5 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Phoenix based exploit kit for educational purpose.☆17Dec 2, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆19Feb 11, 2026Updated 2 months ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Sifter - All purpose penetration testing op-center☆82Nov 23, 2022Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- ☆10Mar 14, 2020Updated 6 years ago
- A Python obfuscator using HTTP Requests and Hastebin.☆50Jul 1, 2022Updated 3 years ago