Project Summary This project was developed for the Computer Security course at my academic degree. Basically, it will encrypt your files in background using AES-256-CTR, a strong encryption algorithm, using RSA-4096 to secure the exchange with the server, optionally using the Tor SOCKS5 Proxy. The base functionality is what you see in the famous…
☆88Apr 14, 2021Updated 4 years ago
Alternatives and similar repositories for ransomware
Users that are interested in ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The vbalancer is a highload proxy for TCP traffic. It provides high availability, scalability for applications running on multiple server…☆28Feb 11, 2026Updated last month
- A live streaming server supporting TCP, UDP, SRT, and WebRTC.☆17May 15, 2021Updated 4 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 9 years ago
- An open-source .NET Ransomware☆22Aug 2, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- ☆21Feb 22, 2025Updated last year
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 3 months ago
- Build SDR drivers for URH☆12Feb 28, 2022Updated 4 years ago
- 🚀 To step up in Quantum Computing, Here is a toolkit implementing fundamental quantum algorithms using IBM's Qiskit framework. Features …☆13Jan 6, 2025Updated last year
- Self-hosted webmail client greatly inspired by Google Inbox (Backend)☆13Nov 24, 2022Updated 3 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- 一款强大的内网信息收集工具,支持文件、文件夹、文件内容、命令、注册表、进程、mimikatz命令、dpapi、最近访问收集,且支持定制化配置,只需更新配置文件,定义收集规则,即可开启对各类浏览器、remote工具、聊天软件进行凭据、信息收集☆22Oct 16, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Collection of android malware samples☆56Jul 22, 2017Updated 8 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- Powershell Ransomware☆22Jan 3, 2017Updated 9 years ago
- Simple reverse shell to avoid Windows defender and kaspersky detection☆21Dec 20, 2021Updated 4 years ago
- ☆28Mar 3, 2026Updated 3 weeks ago
- Simple tool to monitor network changes over time and trigger alerts☆15Mar 11, 2020Updated 6 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆20May 19, 2023Updated 2 years ago
- Check for a set of proxies different conditions, is the proxy working, does the proxy bypass cloudflare and so on.☆13Mar 8, 2020Updated 6 years ago
- A concept package that helps implement mixin behavior using embedded structs and hook interfaces.☆25Feb 22, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆29Oct 2, 2024Updated last year
- Open YARA scan- and search engine☆26Feb 23, 2025Updated last year
- a simple reverse connected bot in golang.☆17Jun 14, 2022Updated 3 years ago
- proxy checker to check the status of the ip-port proxy list☆25Aug 24, 2021Updated 4 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- Source Code of Jigsaw Ransomware Created in Vb.Net☆20Mar 16, 2018Updated 8 years ago
- 📧 A go package for writing postfix policy servers☆13Oct 6, 2022Updated 3 years ago
- SSH password crack for penetration tests using brute force and dictionary attacks.☆13Dec 19, 2025Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆13Aug 15, 2016Updated 9 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Custom hashcat kernel for new Metamask Vaults☆20Dec 12, 2025Updated 3 months ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- TWRP Source for OnePlus Nord N10 (billie)☆19May 21, 2025Updated 10 months ago