QUADEMU / eda2Links
rsmware forked C#/PHP/MySQL
☆14Updated 8 years ago
Alternatives and similar repositories for eda2
Users that are interested in eda2 are comparing it to the libraries listed below
Sorting:
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- an open source ransomware-like file crypter kit☆13Updated 9 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Android wireless karma attack detector☆67Updated 10 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago
- Cross Platform Malware Development Framework☆69Updated 10 years ago
- a MITM attack tool☆85Updated 10 years ago
- RCS Agent for Linux☆107Updated 10 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Updated 11 years ago
- a more complex ransomware honeypot☆125Updated 9 years ago
- IRC-based mass router scanner/exploiter - The project is no longer maintained.☆89Updated 9 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 11 years ago
- Common components for RCS backend☆135Updated 10 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Updated 10 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 10 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- HTTP Header Analysis Vulnerability Tool☆115Updated 5 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 10 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Updated 16 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆115Updated 9 years ago
- Detect snooper on your system!☆85Updated 9 years ago