an open source ransomware-like file crypter kit
☆13Apr 4, 2016Updated 10 years ago
Alternatives and similar repositories for hidden-tear
Users that are interested in hidden-tear are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- rsmware forked C#/PHP/MySQL☆14Apr 27, 2017Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Gist API sample app☆11Jun 15, 2016Updated 9 years ago
- SECCON2016 online CTF for public☆29Feb 7, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 10 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 12 years ago
- ☆49Apr 22, 2013Updated 13 years ago
- Meteor mobile application to create and track workouts☆11Sep 18, 2016Updated 9 years ago
- Isomorphic web application built using the Navigation router and Edge.js☆11Apr 5, 2016Updated 10 years ago
- The migration tool to import Blockchain data to neo4j.☆13Apr 9, 2019Updated 7 years ago
- Repo to host the Particle Pi Camera project☆14Aug 20, 2025Updated 8 months ago
- python version of "house party protocol" program☆24Mar 30, 2015Updated 11 years ago
- Yeoman generator for ASP.NET 5 plus additional templates☆10Aug 11, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A unified hackathon management system powered by Meteor☆13Nov 15, 2015Updated 10 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- Knowledgebase for Docker on Windows☆10Apr 14, 2017Updated 9 years ago
- Some of the more common uses of hash functions.☆12Sep 3, 2025Updated 7 months ago
- AES Crypter for Society of Engineers Remote Access Trojan (RAT) Project Lead: Derek Ta Security Programmer: Taegan Warren☆16Nov 29, 2014Updated 11 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- This is a white label solution to create a contribution crypto-wallet that can be used in your ICO campaign.☆21Jun 25, 2017Updated 8 years ago
- Another archive cracker created in python | cracking [zip/7z/rar] by bruteforcing [ NOT MAINTAINED ]☆22Aug 7, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SunContract Smart Contract for the token sale☆11Mar 22, 2019Updated 7 years ago
- Recover private keys from a (corrupted) wallet.dat (Reddcoin)☆11Dec 17, 2020Updated 5 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- EShop tool☆14Dec 13, 2016Updated 9 years ago
- Quick example of running Redis as a service fabric service.☆12Mar 14, 2019Updated 7 years ago
- Fully functional multi-currency Bitcoin exchange, adaptable to other cryptocurrencies.☆13Oct 13, 2016Updated 9 years ago
- Slack commands for searching beers☆13Oct 31, 2017Updated 8 years ago
- A template for quickly starting Meteor application development☆15May 24, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Docker Base Images (Centos/Alpine/Ubuntu)☆14Jan 18, 2019Updated 7 years ago
- 🐳 Docker image to mirror SVN repositories to Git periodically☆15Apr 22, 2020Updated 6 years ago
- Python module for sending bitcoin transaction directly to the bitcoin network☆15Aug 7, 2012Updated 13 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Feb 20, 2018Updated 8 years ago
- ☆10Jul 24, 2017Updated 8 years ago
- Example of deploying an MVC application with app settings using the Azure Deploy Button☆13Apr 9, 2024Updated 2 years ago
- Dallas One-Wire temp sensor DS18XXX Particle Photon☆13Feb 19, 2017Updated 9 years ago