Malwareman007 / Ransomware
A Ransomware Based in AES256 Algorithm
☆16Updated 2 years ago
Alternatives and similar repositories for Ransomware:
Users that are interested in Ransomware are comparing it to the libraries listed below
- A POC OF CVE-2022-2274 (openssl)☆16Updated 2 years ago
- Config files for my GitHub profile.☆14Updated last year
- It Map Social Media With Photo☆28Updated 2 years ago
- A POC of CVE-2022-30206☆15Updated 2 years ago
- All Type Of Tools written in multipule language .☆20Updated 2 years ago
- POC Of CVE-2022-21971☆11Updated 2 years ago
- POC Of CVE-2022-26937☆14Updated 2 years ago
- Proof of Concept of CVE-2022-30190☆37Updated 2 years ago
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆19Updated 2 years ago
- Movie Recommendation System based on machine learning concepts☆10Updated last year
- POC OF CVE-2022-21970☆14Updated 2 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Updated last week
- TechViper is an advanced web security scanner designed to detect various vulnerabilities in web applications.☆14Updated 5 months ago
- A Web Vulnerability Scanner and Patcher☆168Updated this week
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- 「📖」Tool created to extract metadata from a domain☆13Updated last month
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆22Updated last year
- Dogma V1.5.3☆29Updated 4 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- ☆11Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- 「🔎」CORS vulnerability scanner☆10Updated last month
- xdebug 2.5.5 RCE exploit☆29Updated this week
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆19Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆36Updated last year
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated last year
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated 5 months ago
- Subdomain Recon Tool☆13Updated 2 years ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆10Updated 8 months ago