Chaos Ransomware builder
☆13Aug 10, 2022Updated 3 years ago
Alternatives and similar repositories for Ransomware-Builder
Users that are interested in Ransomware-Builder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- TelerikUI Vulnerability Scanner (CVE-2019-18935)☆12May 10, 2023Updated 2 years ago
- autoscan - automatic fingerprint of visited networks☆11Nov 2, 2013Updated 12 years ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago
- Common password lists, filtered by complexity and length policy.☆16Sep 22, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated 3 months ago
- Matrix effect in bash☆12Feb 15, 2017Updated 9 years ago
- A creation guide to running a web server on AWS in php☆12Jul 6, 2020Updated 5 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆11Jul 26, 2022Updated 3 years ago
- Used to get NTLMv2 Hashes from SMB☆24Oct 24, 2024Updated last year
- A collaborative, multi-platform, red teaming framework☆13Jan 19, 2020Updated 6 years ago
- LockBit-Black-Builder_ ;this is Lockbit Black Builder☆10Sep 28, 2022Updated 3 years ago
- A Remote Access Tool For Apple OSX Devices☆59Jun 25, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- HTTP AUTH cli brute force script written in PHP☆14Jun 26, 2012Updated 13 years ago
- This script is designed to analyze a website is vulnerable to an XMLRPC DoS attack.☆14Jul 3, 2023Updated 2 years ago
- Send mail to anyone, instantly, anonymously.☆22Dec 25, 2021Updated 4 years ago
- A framework which can track any lost/stolen android phone and retrieve important data from the phone like files,contact numbers autonomou…☆15Aug 5, 2015Updated 10 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- - Anonymous E-Mail sending. - E-Mail bombing without logging in. - Sms bombing by victim no.☆10Oct 21, 2023Updated 2 years ago
- Tired of not working tools for brute force? I was too, now we all have a fully working tool, this little fire brute forces multible socia…☆11Sep 3, 2022Updated 3 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 8 months ago
- ☆10Oct 1, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Web Scanner written in Python which after scanning the given URL returns it's domain name, ip address, nmap scan results and also the con…☆20Jun 2, 2024Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆26May 6, 2024Updated 2 years ago
- An Android music player based on Apollo.☆25Feb 2, 2014Updated 12 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- WhatWebGUI is a cross-platform compatible Java-based application for Windows 10, Mac OSX and Linux which implements the front end of the …☆16Mar 1, 2021Updated 5 years ago
- This is an python based gui application made by tkinter module. This is and simple and usedfull password manager gui application 🔒☆12Oct 18, 2021Updated 4 years ago
- Simulation of regular login activity on a site and random activity from a hacker using a brute-force password guessing attack.☆15Mar 17, 2023Updated 3 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- SecDojo 23jan CTF writeup.☆14Jan 25, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- All-in-One WebSploit Installer for Android Devices (Termux) Created by @Voldemort1912☆12Feb 20, 2019Updated 7 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆59Nov 12, 2017Updated 8 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 12 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆26Mar 26, 2021Updated 5 years ago
- Encryption and Decryption. Windows Application.☆10Feb 25, 2021Updated 5 years ago
- Free Cybersecurity tutorials for beginners with 351 interactive lessons. Easy-to-follow programming guides with hands-on practice exercis…☆34Oct 23, 2025Updated 6 months ago
- RANSOMWARE BUILDER FOR WINDOWS☆10Feb 26, 2024Updated 2 years ago