Project Summary This project was developed for the Computer Security course at my academic degree. Basically, it will encrypt your files in background using AES-256-CTR, a strong encryption algorithm, using RSA-4096 to secure the exchange with the server, optionally using the Tor SOCKS5 Proxy. The base functionality is what you see in the famous…
☆87Apr 14, 2021Updated 5 years ago
Alternatives and similar repositories for ransomware
Users that are interested in ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The vbalancer is a highload proxy for TCP traffic. It provides high availability, scalability for applications running on multiple server…☆28Feb 11, 2026Updated 2 months ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- A live streaming server supporting TCP, UDP, SRT, and WebRTC.☆17May 15, 2021Updated 4 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An open-source .NET Ransomware☆23Aug 2, 2021Updated 4 years ago
- p7zip with hfs symlink support☆10Jul 18, 2015Updated 10 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Jul 27, 2017Updated 8 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 4 months ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Mar 13, 2021Updated 5 years ago
- Build SDR drivers for URH☆12Feb 28, 2022Updated 4 years ago
- Self-hosted webmail client greatly inspired by Google Inbox (Backend)☆13Nov 24, 2022Updated 3 years ago
- go-active-learning is a command line annotation tool for binary classification problem written in Go.☆15Apr 3, 2021Updated 5 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 一款强大的内网信息收集工具,支持文件、文件夹、文件内容、命令、注册表、进程、mimikatz命令、dpapi、最近访问收集,且支持定制化配置,只需更新配置文件,定义收集规则,即可开启对各类浏览器、remote工具、聊天软件进行凭据、信息收集☆22Oct 16, 2022Updated 3 years ago
- Kexec Magisk Module☆24Mar 25, 2026Updated 3 weeks ago
- ☆29Mar 3, 2026Updated last month
- Check for a set of proxies different conditions, is the proxy working, does the proxy bypass cloudflare and so on.☆13Mar 8, 2020Updated 6 years ago
- Add Let's Encrypt (ACME) support to generate and renew SSL certificates to go servers using the DNS provider challenge.☆12Jun 20, 2016Updated 9 years ago
- A Linux worm targeting vulnerable IoT devices with MMU. Reengineered from/inspired by Mirai botnet.☆18Nov 6, 2022Updated 3 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆29Oct 2, 2024Updated last year
- Open YARA scan- and search engine☆26Feb 23, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- a simple reverse connected bot in golang.☆18Jun 14, 2022Updated 3 years ago
- A major platforms RAT Tools .High scalability.Now support Windows/Linux/MacOS☆84Apr 20, 2022Updated 3 years ago
- 📧 A go package for writing postfix policy servers☆13Oct 6, 2022Updated 3 years ago
- A go-smtp-server backend that proxies messages to another SMTP server☆26Jul 11, 2021Updated 4 years ago
- SSH password crack for penetration tests using brute force and dictionary attacks.☆13Dec 19, 2025Updated 4 months ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Utility to copy BIOS data from one ASUS BIOS image file to another☆27Apr 21, 2014Updated 11 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- I'm NOT responsible for ANY damages caused by my malwares!☆25Apr 7, 2026Updated last week
- small operating system☆11Apr 30, 2021Updated 4 years ago
- A Rust implementation of the Handshake and Lightning Network secure messaging protocol - based on Noise.☆12Dec 9, 2019Updated 6 years ago
- Mail log tailing and simple stats collecting application written in Go☆12May 18, 2022Updated 3 years ago
- 1st phase of mifare classic nested auth key recovery☆16Dec 19, 2019Updated 6 years ago
- A Rust library to handle OpenSSH key and other common SSH key☆15Jun 3, 2023Updated 2 years ago