MeteorAdminz / hidden-tearLinks
an open source ransomware-like file crypter kit
☆13Updated 9 years ago
Alternatives and similar repositories for hidden-tear
Users that are interested in hidden-tear are comparing it to the libraries listed below
Sorting:
- rsmware forked C#/PHP/MySQL☆14Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Wifi Pineapple - Repository, Issue tracker, Wiki☆40Updated 13 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Updated 13 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 9 years ago
- TOR Mail encrypted server for Hidden Services☆41Updated 9 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆44Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- disthc☆27Updated 11 years ago
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- RESTful interface to your operating system shell☆19Updated 7 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- Decryption Tool☆145Updated 6 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 7 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 10 years ago
- Pineapple Surprise! is a PHP implementation for the Wi-Fi Pineapple or "Jasager". Used in conjunction with dnsspoof it will serve a "surp…☆64Updated 8 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆49Updated 10 years ago
- OpenBank - Your BTC realtime tracker.☆74Updated 2 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- ☆12Updated 8 years ago
- Distributed File Storage Using JavaScript Botnets☆114Updated 12 years ago