Chaos Ransomware builder
☆13Aug 10, 2022Updated 3 years ago
Alternatives and similar repositories for Ransomware-Builder
Users that are interested in Ransomware-Builder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- A creation guide to running a web server on AWS in php☆12Jul 6, 2020Updated 5 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆11Jul 26, 2022Updated 3 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- A collaborative, multi-platform, red teaming framework☆13Jan 19, 2020Updated 6 years ago
- A Remote Access Tool For Apple OSX Devices☆55Jun 25, 2020Updated 5 years ago
- A simple windows batch script intended to look like an FBI security warning, while stealing their data onto a USB.☆10Apr 5, 2022Updated 3 years ago
- This is a Python based GUI(Graphical User Interface) application for Google Dorking. Easy and convinient tool☆10Jul 13, 2023Updated 2 years ago
- This script is designed to analyze a website is vulnerable to an XMLRPC DoS attack.☆14Jul 3, 2023Updated 2 years ago
- Send mail to anyone, instantly, anonymously.☆22Dec 25, 2021Updated 4 years ago
- A framework which can track any lost/stolen android phone and retrieve important data from the phone like files,contact numbers autonomou…☆16Aug 5, 2015Updated 10 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Tired of not working tools for brute force? I was too, now we all have a fully working tool, this little fire brute forces multible socia…☆11Sep 3, 2022Updated 3 years ago
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tran☆14May 27, 2023Updated 2 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 7 months ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆14Jun 2, 2019Updated 6 years ago
- Web Scanner written in Python which after scanning the given URL returns it's domain name, ip address, nmap scan results and also the con…☆20Jun 2, 2024Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- An Android music player based on Apollo.☆25Feb 2, 2014Updated 12 years ago
- WhatWebGUI is a cross-platform compatible Java-based application for Windows 10, Mac OSX and Linux which implements the front end of the …☆16Mar 1, 2021Updated 5 years ago
- This is an python based gui application made by tkinter module. This is and simple and usedfull password manager gui application 🔒☆12Oct 18, 2021Updated 4 years ago
- Build your very own (very simple) botnet!☆16May 13, 2022Updated 3 years ago
- FindX is an Android phone antitheft app.☆16Nov 9, 2023Updated 2 years ago
- Simulation of regular login activity on a site and random activity from a hacker using a brute-force password guessing attack.☆15Mar 17, 2023Updated 3 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- All-in-One WebSploit Installer for Android Devices (Termux) Created by @Voldemort1912☆12Feb 20, 2019Updated 7 years ago
- an osint automation tool written in Batchfile for lookups including person, phone number, email, license plate, and VIN. this tool only w…☆70Oct 5, 2020Updated 5 years ago
- ☆13Apr 29, 2023Updated 2 years ago
- RANSOMWARE BUILDER FOR WINDOWS☆10Feb 26, 2024Updated 2 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- Scrape a Facebook profile and turn it into a JSON file☆19Oct 24, 2018Updated 7 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- Kernel module to hide tcp connections from an attacker ip address☆11Mar 24, 2022Updated 3 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- ☆16Aug 3, 2017Updated 8 years ago
- These are the notes i have been taking since i started learning about ethical hacking and cybersecurity☆24Oct 16, 2023Updated 2 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago