MeteorAdminz / hidden-tearLinks
an open source ransomware-like file crypter kit
☆13Updated 9 years ago
Alternatives and similar repositories for hidden-tear
Users that are interested in hidden-tear are comparing it to the libraries listed below
Sorting:
- rsmware forked C#/PHP/MySQL☆14Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- OpenBank - Your BTC realtime tracker.☆74Updated 2 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 8 years ago
- A decryptor for Wanacry (you need the private key!)☆183Updated 8 years ago
- Distributed wrapper around oclHashcat☆93Updated 10 months ago
- disthc☆28Updated 11 years ago
- RESTful interface to your operating system shell☆19Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆93Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- TOR Mail encrypted server for Hidden Services☆44Updated 9 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 7 years ago
- Decryption Tool☆147Updated 6 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Detect snooper on your system!☆85Updated 8 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆76Updated 7 years ago
- Pineapple Surprise! is a PHP implementation for the Wi-Fi Pineapple or "Jasager". Used in conjunction with dnsspoof it will serve a "surp…☆64Updated 9 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆51Updated 10 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- Auto Reaver - multiple access point attack using Reaver☆52Updated 9 years ago
- ☆12Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- You'll never take me alive.☆85Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 10 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Open source exploit framework made in C#☆54Updated last year
- Tools to help detect Hacking Team malware☆79Updated 10 years ago