jdsecurity / CryptoTrooper
The world's first Linux white-box ransomware
☆62Updated 6 years ago
Alternatives and similar repositories for CryptoTrooper:
Users that are interested in CryptoTrooper are comparing it to the libraries listed below
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- BitErrant☆58Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆93Updated 9 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 7 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆151Updated 5 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Removed according to regulations☆35Updated 7 years ago
- Panic button for protection against cold boot attacks☆140Updated 3 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆141Updated 9 years ago
- ☆117Updated 4 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- IRC-based mass router scanner/exploiter - The project is no longer maintained.☆90Updated 8 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- Some NSE scripts to search information from routers☆37Updated 9 years ago
- Tools to help detect Hacking Team malware☆80Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆64Updated 7 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- Proof-of-Concept code for exploits☆82Updated 8 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- Small EFI utility that clears the power-on and setup passwords in IBM x3550/x3650 M3 servers☆46Updated 4 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Hohha Dynamic XOR Encryption Algorithm☆54Updated 5 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago