Simple C++ cryptolocker Blowfish CBC
☆18Apr 13, 2019Updated 7 years ago
Alternatives and similar repositories for CRYPTOPOKEMON
Users that are interested in CRYPTOPOKEMON are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC for utilizing wikipedia API for Command and Control☆29Dec 8, 2022Updated 3 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- CVE-2018-4407 IOS/macOS kernel crash☆13Feb 23, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Reverse TCP Python Framework☆25Nov 7, 2017Updated 8 years ago
- Simple little rootkit made in C☆14Feb 15, 2021Updated 5 years ago
- Splunk Technology Add-On (TA) for collecting ETW events from Windows systems☆16Dec 8, 2022Updated 3 years ago
- ☆10Apr 19, 2026Updated 2 weeks ago
- ☆17Jul 26, 2018Updated 7 years ago
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆20Updated this week
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆13Apr 21, 2022Updated 4 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- ☆37Dec 10, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- HydraSide is a opensource Tor Based RAT (*Remote Administration Tool*)☆22Mar 12, 2015Updated 11 years ago
- An android spying application☆38Jul 25, 2018Updated 7 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆16Feb 13, 2017Updated 9 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 6 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 4 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- ☆11Jun 26, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆20Jun 27, 2019Updated 6 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- Stateful packet processing: port knocking PoC in BPF☆32Jul 28, 2016Updated 9 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- ☆22Oct 22, 2019Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆55May 11, 2021Updated 4 years ago
- ☆11May 13, 2019Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 14 years ago
- Linux AV tests☆13Apr 23, 2019Updated 7 years ago