PoC Hacking Tool Contains so many stuff like hash cracking, Crypter, Ransomware Builder, etc...
☆16Aug 27, 2021Updated 4 years ago
Alternatives and similar repositories for MineHackingTools
Users that are interested in MineHackingTools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RANSOMWARE BUILDER FOR WINDOWS☆10Feb 26, 2024Updated 2 years ago
- Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42),…☆21Mar 29, 2022Updated 3 years ago
- Trojan Rat Builder(310), Ransomware Builder(7), Crypter(72), Miner(9), Worm(8), Botnet(25), Virus Builder(9), Binder(25), Exploit(7), Key…☆11Sep 10, 2021Updated 4 years ago
- Storage for the IOCs I collect☆11Mar 26, 2025Updated 11 months ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Jan 13, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Nov 12, 2017Updated 8 years ago
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆20Apr 14, 2022Updated 3 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- This repository has all kinds of Python malwares, which I posted in my channel. The goal is to familiarize yourself with how different ty…☆22Mar 17, 2024Updated 2 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Jul 8, 2021Updated 4 years ago
- ☆11May 17, 2023Updated 2 years ago
- Fud Runpe Av Evasion / All Av Bypass☆31Feb 24, 2023Updated 3 years ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Fork of Unity mono that's used to compile mono.dll with debugging support enabled☆14Feb 24, 2021Updated 5 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- A very simple modify for RAT Njrat 0.7D☆16Nov 4, 2017Updated 8 years ago
- NanoCore rat stub source code☆39May 25, 2022Updated 3 years ago
- Python module to encrypt/decrypt messages using the Solfa cipher.☆21Jun 10, 2017Updated 8 years ago
- ☆11Dec 17, 2024Updated last year
- Just a simple ransomware in python with a command and control server (C2) that is running flask☆33Aug 6, 2021Updated 4 years ago
- Adobe Reader DC Information Leak Exploit☆23Oct 13, 2022Updated 3 years ago
- .NET Code Virtualization with cool features. Once intended to sell. Rip VirtualGuard.io☆16Feb 8, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.☆19Sep 21, 2023Updated 2 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- Group 4 - C# Remote Administrator Tool☆11Feb 18, 2025Updated last year
- A C# Source Generator for obfuscating string or byte array values using multi-byte xor encryption.☆14Jun 12, 2024Updated last year
- Fyyx Wallet Finder is a Python app that searches for cryptocurrency wallets with balances in BTC and ETH. It logs results/errors and save…☆12Jun 11, 2024Updated last year
- An OSINT tool for IT ninjas.☆11Jul 31, 2024Updated last year
- Sms Bomber (Mr Bomber)☆11Aug 7, 2023Updated 2 years ago
- Work in progress porting my blog software to Common Lisp☆10Sep 18, 2019Updated 6 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- A tool that patches the ChromeDriver binary to avert a "basic" bot detection method used by most anti-automation services.☆15May 15, 2022Updated 3 years ago
- Tool to evade Antivirus With Different Techniques☆194Aug 16, 2023Updated 2 years ago
- ☆24Nov 28, 2021Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- A fully working example of how to exploit log4j on a minecraft server☆30Apr 24, 2023Updated 2 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago