The Ranflood ransomware contrast tool
☆17Dec 18, 2024Updated last year
Alternatives and similar repositories for ranflood
Users that are interested in ranflood are comparing it to the libraries listed below
Sorting:
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- Camera Hack bot - Powered by XPH4N70M☆23May 26, 2023Updated 2 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆22Jan 25, 2022Updated 4 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 5 months ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- Anywhere is a powerful botnet that allows for the remote control of compromised devices☆29Jan 19, 2023Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 3 months ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 3 months ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- A Docker image of Knot DNS Resolver with hBlock.☆34Feb 1, 2026Updated last month
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- android virus to annoy your friends☆46Jan 11, 2023Updated 3 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- Ransomware Decryptors☆36Apr 28, 2022Updated 3 years ago
- Notes From Doing The 3CX Basic Certification☆14May 6, 2022Updated 3 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- ☆27Feb 18, 2026Updated last week
- Categorized hosts files for DNS based content blocking☆33Nov 7, 2025Updated 3 months ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆33Jan 10, 2021Updated 5 years ago
- My personalized Hosts file collection of various sources, cleaned and optimized specially for pDNSf☆30Updated this week
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆18Sep 9, 2025Updated 5 months ago
- Python script for downloading books as PDF from Booktab software.☆13Mar 4, 2021Updated 4 years ago
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- اداة لاقفال ترمكس بكلمة مرور☆14Aug 5, 2022Updated 3 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆144Jun 21, 2023Updated 2 years ago
- Keep It Secure Private Data Encryption & Decryption Tool☆45Mar 11, 2018Updated 7 years ago
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆48Updated this week
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- ☆11Nov 30, 2020Updated 5 years ago
- SentinelOne Windows Installation Diagnostic☆11Apr 14, 2025Updated 10 months ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago