GregorSpagnolo / WannaCryptLinks
Known WannCrypt Bitcoin addresses
☆10Updated 8 years ago
Alternatives and similar repositories for WannaCrypt
Users that are interested in WannaCrypt are comparing it to the libraries listed below
Sorting:
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Updated 6 years ago
- pentest toolbox☆27Updated 3 years ago
- A Linux RAT in C☆33Updated 7 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆34Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Links or additional data to some researches☆14Updated 6 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24Updated 7 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Updated 2 years ago
- Unofficial WhatCMS API package☆40Updated 4 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- Infecting PE☆25Updated 11 years ago
- A simple python reverse shell written just for fun.☆62Updated 2 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- ☆11Updated 8 years ago
- Various tools to track the Mirai botnet☆20Updated 9 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Python version of OWASP's DirBuster Application.☆29Updated 11 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Updated 7 years ago
- WordPress Gravity Forms Plugin 1.8.19 - Arbitrary File Upload☆33Updated 3 years ago
- Template for asynchronously controlling meterpreter sessions☆12Updated 7 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 5 years ago
- My public exploit collection.☆31Updated 7 years ago
- a javascript keylogger included in a gif file☆39Updated 5 months ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Updated 2 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago