Chaos Ransomware builder
☆13Aug 10, 2022Updated 3 years ago
Alternatives and similar repositories for Ransomware-Builder
Users that are interested in Ransomware-Builder are comparing it to the libraries listed below
Sorting:
- ☆11Dec 26, 2022Updated 3 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- An Android music player based on Apollo.☆25Feb 2, 2014Updated 12 years ago
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆11Jul 26, 2022Updated 3 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- This is an python based gui application made by tkinter module. This is and simple and usedfull password manager gui application 🔒☆12Oct 18, 2021Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- the cat mod no one wanted☆10Dec 27, 2025Updated 2 months ago
- Make music while you program.☆43Apr 11, 2014Updated 11 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 9 months ago
- HTTP AUTH cli brute force script written in PHP☆14Jun 26, 2012Updated 13 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 11 years ago
- A creation guide to running a web server on AWS in php☆12Jul 6, 2020Updated 5 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- This is a Python based GUI(Graphical User Interface) application for Google Dorking. Easy and convinient tool☆10Jul 13, 2023Updated 2 years ago
- Sencillo juego del ahorcado con html y javascript☆14Nov 8, 2017Updated 8 years ago
- Kernel module to hide tcp connections from an attacker ip address☆11Mar 24, 2022Updated 3 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- Alat Bantu Coding Front-end Kamu☆11May 19, 2023Updated 2 years ago
- Tired of not working tools for brute force? I was too, now we all have a fully working tool, this little fire brute forces multible socia…☆11Sep 3, 2022Updated 3 years ago
- Vietnamese Language for MIUI☆10Jan 11, 2026Updated last month
- Simple CLIENT side bypass for the Microsoft Defender for Cloud Apps Proxy☆15Apr 8, 2022Updated 3 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- All of the custom Friday Night Funkin' Voicebanks I use in my videos. If you use these, you have to credit me in the description of your …☆12Dec 28, 2023Updated 2 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- ☆10Mar 29, 2022Updated 3 years ago
- FindX is an Android phone antitheft app.☆16Nov 9, 2023Updated 2 years ago
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 3 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated last year
- Shellphish is one of the phishing methods that use any website clone to get the victim's details. One of the details examples is the spam…☆14Jul 12, 2021Updated 4 years ago
- Access this repo on codeberg: https://codeberg.org/fieryhenry/BCGM-Python☆16Aug 17, 2025Updated 6 months ago
- Web Scanner written in Python which after scanning the given URL returns it's domain name, ip address, nmap scan results and also the con…☆20Jun 2, 2024Updated last year
- Batch NetWork Worm with Download & Execute Payload☆12May 26, 2020Updated 5 years ago