Malwareman007 / Ransomware
A Ransomware Based in AES256 Algorithm
☆17Updated 2 years ago
Alternatives and similar repositories for Ransomware:
Users that are interested in Ransomware are comparing it to the libraries listed below
- It Map Social Media With Photo☆27Updated 2 years ago
- All Type Of Tools written in multipule language .☆20Updated 2 years ago
- A POC OF CVE-2022-2274 (openssl)☆16Updated 2 years ago
- Config files for my GitHub profile.☆13Updated last year
- POC Of CVE-2022-26937☆14Updated 2 years ago
- POC Of CVE-2022-21971☆11Updated 2 years ago
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆19Updated 2 years ago
- A POC of CVE-2022-30206☆15Updated 2 years ago
- Proof of Concept of CVE-2022-30190☆37Updated 2 years ago
- POC OF CVE-2022-21970☆14Updated 2 years ago
- Movie Recommendation System based on machine learning concepts☆10Updated last year
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Updated 3 months ago
- TechViper is an advanced web security scanner designed to detect various vulnerabilities in web applications.☆18Updated 8 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- A Web Vulnerability Scanner and Patcher☆172Updated last month
- xdebug 2.5.5 RCE exploit☆30Updated 3 months ago
- Remote persistent keylogger for Windows and Linux..☆12Updated 2 years ago
- Subdomain Recon Tool☆13Updated 2 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- This tool is used to find the admin login page of a website.☆16Updated 4 years ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated 11 months ago
- Argument injection vulnerability in PHP☆11Updated 10 months ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆20Updated last year
- Simple Webshell for Hackers☆9Updated 3 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- hack a wifi client using this tool☆11Updated last year
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated last year
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 3 years ago