Project Summary This project was developed for the Computer Security course at my academic degree. Basically, it will encrypt your files in background using AES-256-CTR, a strong encryption algorithm, using RSA-4096 to secure the exchange with the server, optionally using the Tor SOCKS5 Proxy. The base functionality is what you see in the famous…
☆88Apr 14, 2021Updated 5 years ago
Alternatives and similar repositories for ransomware
Users that are interested in ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- A live streaming server supporting TCP, UDP, SRT, and WebRTC.☆17May 15, 2021Updated 4 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 5 years ago
- p7zip with hfs symlink support☆10Jul 18, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Jul 27, 2017Updated 8 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 4 months ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Mar 13, 2021Updated 5 years ago
- Build SDR drivers for URH☆12Feb 28, 2022Updated 4 years ago
- Self-hosted webmail client greatly inspired by Google Inbox (Backend)☆13Nov 24, 2022Updated 3 years ago
- go-active-learning is a command line annotation tool for binary classification problem written in Go.☆15Apr 3, 2021Updated 5 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- Powershell Ransomware☆22Jan 3, 2017Updated 9 years ago
- Collection of android malware samples☆56Jul 22, 2017Updated 8 years ago
- Simple tool to monitor network changes over time and trigger alerts☆15Mar 11, 2020Updated 6 years ago
- Kexec Magisk Module☆26Mar 25, 2026Updated last month
- Add Let's Encrypt (ACME) support to generate and renew SSL certificates to go servers using the DNS provider challenge.☆12Jun 20, 2016Updated 9 years ago
- A Linux worm targeting vulnerable IoT devices with MMU. Reengineered from/inspired by Mirai botnet.☆18Nov 6, 2022Updated 3 years ago
- A concept package that helps implement mixin behavior using embedded structs and hook interfaces.☆25Feb 22, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆30Oct 2, 2024Updated last year
- Decentralized password manager☆21Oct 10, 2021Updated 4 years ago
- A major platforms RAT Tools .High scalability.Now support Windows/Linux/MacOS☆84Apr 20, 2022Updated 4 years ago
- Open YARA scan- and search engine☆27Feb 23, 2025Updated last year
- WannaCry|WannaDecrypt0r decompiled☆30May 16, 2017Updated 8 years ago
- ☆46Apr 28, 2026Updated last week
- Simple Spyder BOT Auto Exploit Mass Local File Disclosure Joomla ( Fix Speed ) <3☆10Nov 5, 2019Updated 6 years ago
- A go-smtp-server backend that proxies messages to another SMTP server☆26Jul 11, 2021Updated 4 years ago
- SSH password crack for penetration tests using brute force and dictionary attacks.☆13Dec 19, 2025Updated 4 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- Generate Professional Phishing Emails Templates Fast And Easy☆14May 2, 2020Updated 6 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 7 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- I'm NOT responsible for ANY damages caused by my malwares!☆23Updated this week
- Simple Calculator for termux to help with common mathematic problems☆13Nov 25, 2020Updated 5 years ago